cjson
fuzzing
inputs
test1 test10 test11 test2 test3 test3.bu test3.uf test3.uu test4 test5 test6 test7 test8 test9library_config
cJSONConfig.cmake.in cJSONConfigVersion.cmake.in libcjson.pc.in libcjson_utils.pc.in uninstall.cmaketests
inputs
test1 test1.expected test10 test10.expected test11 test11.expected test2 test2.expected test3 test3.expected test4 test4.expected test5 test5.expected test6 test7 test7.expected test8 test8.expected test9 test9.expectedjson-patch-tests
.editorconfig .gitignore .npmignore README.md cjson-utils-tests.json package.json spec_tests.json tests.jsonunity
auto
colour_prompt.rb colour_reporter.rb generate_config.yml generate_module.rb generate_test_runner.rb parse_output.rb stylize_as_junit.rb test_file_filter.rb type_sanitizer.rb unity_test_summary.py unity_test_summary.rb unity_to_junit.pydocs
ThrowTheSwitchCodingStandard.md UnityAssertionsCheatSheetSuitableforPrintingandPossiblyFraming.pdf UnityAssertionsReference.md UnityConfigurationGuide.md UnityGettingStartedGuide.md UnityHelperScriptsGuide.md license.txtexamples
unity_config.hcurl
.github
scripts
cleancmd.pl cmp-config.pl cmp-pkg-config.sh codespell-ignore.words codespell.sh distfiles.sh pyspelling.words pyspelling.yaml randcurl.pl requirements-docs.txt requirements-proselint.txt requirements.txt shellcheck-ci.sh shellcheck.sh spellcheck.curl trimmarkdownheader.pl typos.sh typos.toml verify-examples.pl verify-synopsis.pl yamlcheck.sh yamlcheck.yamlworkflows
appveyor-status.yml checkdocs.yml checksrc.yml checkurls.yml codeql.yml configure-vs-cmake.yml curl-for-win.yml distcheck.yml fuzz.yml http3-linux.yml label.yml linux-old.yml linux.yml macos.yml non-native.yml windows.ymlCMake
CurlSymbolHiding.cmake CurlTests.c FindBrotli.cmake FindCares.cmake FindGSS.cmake FindGnuTLS.cmake FindLDAP.cmake FindLibbacktrace.cmake FindLibgsasl.cmake FindLibidn2.cmake FindLibpsl.cmake FindLibssh.cmake FindLibssh2.cmake FindLibuv.cmake FindMbedTLS.cmake FindNGHTTP2.cmake FindNGHTTP3.cmake FindNGTCP2.cmake FindNettle.cmake FindQuiche.cmake FindRustls.cmake FindWolfSSL.cmake FindZstd.cmake Macros.cmake OtherTests.cmake PickyWarnings.cmake Utilities.cmake cmake_uninstall.in.cmake curl-config.in.cmake unix-cache.cmake win32-cache.cmakedocs
cmdline-opts
.gitignore CMakeLists.txt MANPAGE.md Makefile.am Makefile.inc _AUTHORS.md _BUGS.md _DESCRIPTION.md _ENVIRONMENT.md _EXITCODES.md _FILES.md _GLOBBING.md _NAME.md _OPTIONS.md _OUTPUT.md _PROGRESS.md _PROTOCOLS.md _PROXYPREFIX.md _SEEALSO.md _SYNOPSIS.md _URL.md _VARIABLES.md _VERSION.md _WWW.md abstract-unix-socket.md alt-svc.md anyauth.md append.md aws-sigv4.md basic.md ca-native.md cacert.md capath.md cert-status.md cert-type.md cert.md ciphers.md compressed-ssh.md compressed.md config.md connect-timeout.md connect-to.md continue-at.md cookie-jar.md cookie.md create-dirs.md create-file-mode.md crlf.md crlfile.md curves.md data-ascii.md data-binary.md data-raw.md data-urlencode.md data.md delegation.md digest.md disable-eprt.md disable-epsv.md disable.md disallow-username-in-url.md dns-interface.md dns-ipv4-addr.md dns-ipv6-addr.md dns-servers.md doh-cert-status.md doh-insecure.md doh-url.md dump-ca-embed.md dump-header.md ech.md egd-file.md engine.md etag-compare.md etag-save.md expect100-timeout.md fail-early.md fail-with-body.md fail.md false-start.md follow.md form-escape.md form-string.md form.md ftp-account.md ftp-alternative-to-user.md ftp-create-dirs.md ftp-method.md ftp-pasv.md ftp-port.md ftp-pret.md ftp-skip-pasv-ip.md ftp-ssl-ccc-mode.md ftp-ssl-ccc.md ftp-ssl-control.md get.md globoff.md happy-eyeballs-timeout-ms.md haproxy-clientip.md haproxy-protocol.md head.md header.md help.md hostpubmd5.md hostpubsha256.md hsts.md http0.9.md http1.0.md http1.1.md http2-prior-knowledge.md http2.md http3-only.md http3.md ignore-content-length.md insecure.md interface.md ip-tos.md ipfs-gateway.md ipv4.md ipv6.md json.md junk-session-cookies.md keepalive-cnt.md keepalive-time.md key-type.md key.md knownhosts.md krb.md libcurl.md limit-rate.md list-only.md local-port.md location-trusted.md location.md login-options.md mail-auth.md mail-from.md mail-rcpt-allowfails.md mail-rcpt.md mainpage.idx manual.md max-filesize.md max-redirs.md max-time.md metalink.md mptcp.md negotiate.md netrc-file.md netrc-optional.md netrc.md next.md no-alpn.md no-buffer.md no-clobber.md no-keepalive.md no-npn.md no-progress-meter.md no-sessionid.md noproxy.md ntlm-wb.md ntlm.md oauth2-bearer.md out-null.md output-dir.md output.md parallel-immediate.md parallel-max-host.md parallel-max.md parallel.md pass.md path-as-is.md pinnedpubkey.md post301.md post302.md post303.md preproxy.md progress-bar.md proto-default.md proto-redir.md proto.md proxy-anyauth.md proxy-basic.md proxy-ca-native.md proxy-cacert.md proxy-capath.md proxy-cert-type.md proxy-cert.md proxy-ciphers.md proxy-crlfile.md proxy-digest.md proxy-header.md proxy-http2.md proxy-insecure.md proxy-key-type.md proxy-key.md proxy-negotiate.md proxy-ntlm.md proxy-pass.md proxy-pinnedpubkey.md proxy-service-name.md proxy-ssl-allow-beast.md proxy-ssl-auto-client-cert.md proxy-tls13-ciphers.md proxy-tlsauthtype.md proxy-tlspassword.md proxy-tlsuser.md proxy-tlsv1.md proxy-user.md proxy.md proxy1.0.md proxytunnel.md pubkey.md quote.md random-file.md range.md rate.md raw.md referer.md remote-header-name.md remote-name-all.md remote-name.md remote-time.md remove-on-error.md request-target.md request.md resolve.md retry-all-errors.md retry-connrefused.md retry-delay.md retry-max-time.md retry.md sasl-authzid.md sasl-ir.md service-name.md show-error.md show-headers.md sigalgs.md silent.md skip-existing.md socks4.md socks4a.md socks5-basic.md socks5-gssapi-nec.md socks5-gssapi-service.md socks5-gssapi.md socks5-hostname.md socks5.md speed-limit.md speed-time.md ssl-allow-beast.md ssl-auto-client-cert.md ssl-no-revoke.md ssl-reqd.md ssl-revoke-best-effort.md ssl-sessions.md ssl.md sslv2.md sslv3.md stderr.md styled-output.md suppress-connect-headers.md tcp-fastopen.md tcp-nodelay.md telnet-option.md tftp-blksize.md tftp-no-options.md time-cond.md tls-earlydata.md tls-max.md tls13-ciphers.md tlsauthtype.md tlspassword.md tlsuser.md tlsv1.0.md tlsv1.1.md tlsv1.2.md tlsv1.3.md tlsv1.md tr-encoding.md trace-ascii.md trace-config.md trace-ids.md trace-time.md trace.md unix-socket.md upload-file.md upload-flags.md url-query.md url.md use-ascii.md user-agent.md user.md variable.md verbose.md version.md vlan-priority.md write-out.md xattr.mdexamples
.checksrc .gitignore 10-at-a-time.c CMakeLists.txt Makefile.am Makefile.example Makefile.inc README.md adddocsref.pl address-scope.c altsvc.c anyauthput.c block_ip.c cacertinmem.c certinfo.c chkspeed.c connect-to.c cookie_interface.c crawler.c debug.c default-scheme.c ephiperfifo.c evhiperfifo.c externalsocket.c fileupload.c ftp-delete.c ftp-wildcard.c ftpget.c ftpgetinfo.c ftpgetresp.c ftpsget.c ftpupload.c ftpuploadfrommem.c ftpuploadresume.c getinfo.c getinmemory.c getredirect.c getreferrer.c ghiper.c headerapi.c hiperfifo.c hsts-preload.c htmltidy.c htmltitle.cpp http-options.c http-post.c http2-download.c http2-pushinmemory.c http2-serverpush.c http2-upload.c http3-present.c http3.c httpcustomheader.c httpput-postfields.c httpput.c https.c imap-append.c imap-authzid.c imap-copy.c imap-create.c imap-delete.c imap-examine.c imap-fetch.c imap-list.c imap-lsub.c imap-multi.c imap-noop.c imap-search.c imap-ssl.c imap-store.c imap-tls.c interface.c ipv6.c keepalive.c localport.c log_failed_transfers.c maxconnects.c multi-app.c multi-debugcallback.c multi-double.c multi-event.c multi-formadd.c multi-legacy.c multi-post.c multi-single.c multi-uv.c netrc.c parseurl.c persistent.c pop3-authzid.c pop3-dele.c pop3-list.c pop3-multi.c pop3-noop.c pop3-retr.c pop3-ssl.c pop3-stat.c pop3-tls.c pop3-top.c pop3-uidl.c post-callback.c postinmemory.c postit2-formadd.c postit2.c progressfunc.c protofeats.c range.c resolve.c rtsp-options.c sendrecv.c sepheaders.c sessioninfo.c sftpget.c sftpuploadresume.c shared-connection-cache.c simple.c simplepost.c simplessl.c smooth-gtk-thread.c smtp-authzid.c smtp-expn.c smtp-mail.c smtp-mime.c smtp-multi.c smtp-ssl.c smtp-tls.c smtp-vrfy.c sslbackend.c synctime.c threaded.c unixsocket.c url2file.c urlapi.c usercertinmem.c version-check.pl websocket-cb.c websocket-updown.c websocket.c xmlstream.cinternals
BUFQ.md BUFREF.md CHECKSRC.md CLIENT-READERS.md CLIENT-WRITERS.md CODE_STYLE.md CONNECTION-FILTERS.md CREDENTIALS.md CURLX.md DYNBUF.md HASH.md LLIST.md MID.md MQTT.md MULTI-EV.md NEW-PROTOCOL.md PEERS.md PORTING.md RATELIMITS.md README.md SCORECARD.md SPLAY.md STRPARSE.md THRDPOOL-AND-QUEUE.md TIME-KEEPING.md TLS-SESSIONS.md UINT_SETS.md WEBSOCKET.mdlibcurl
opts
CMakeLists.txt CURLINFO_ACTIVESOCKET.md CURLINFO_APPCONNECT_TIME.md CURLINFO_APPCONNECT_TIME_T.md CURLINFO_CAINFO.md CURLINFO_CAPATH.md CURLINFO_CERTINFO.md CURLINFO_CONDITION_UNMET.md CURLINFO_CONNECT_TIME.md CURLINFO_CONNECT_TIME_T.md CURLINFO_CONN_ID.md CURLINFO_CONTENT_LENGTH_DOWNLOAD.md CURLINFO_CONTENT_LENGTH_DOWNLOAD_T.md CURLINFO_CONTENT_LENGTH_UPLOAD.md CURLINFO_CONTENT_LENGTH_UPLOAD_T.md CURLINFO_CONTENT_TYPE.md CURLINFO_COOKIELIST.md CURLINFO_EARLYDATA_SENT_T.md CURLINFO_EFFECTIVE_METHOD.md CURLINFO_EFFECTIVE_URL.md CURLINFO_FILETIME.md CURLINFO_FILETIME_T.md CURLINFO_FTP_ENTRY_PATH.md CURLINFO_HEADER_SIZE.md CURLINFO_HTTPAUTH_AVAIL.md CURLINFO_HTTPAUTH_USED.md CURLINFO_HTTP_CONNECTCODE.md CURLINFO_HTTP_VERSION.md CURLINFO_LASTSOCKET.md CURLINFO_LOCAL_IP.md CURLINFO_LOCAL_PORT.md CURLINFO_NAMELOOKUP_TIME.md CURLINFO_NAMELOOKUP_TIME_T.md CURLINFO_NUM_CONNECTS.md CURLINFO_OS_ERRNO.md CURLINFO_POSTTRANSFER_TIME_T.md CURLINFO_PRETRANSFER_TIME.md CURLINFO_PRETRANSFER_TIME_T.md CURLINFO_PRIMARY_IP.md CURLINFO_PRIMARY_PORT.md CURLINFO_PRIVATE.md CURLINFO_PROTOCOL.md CURLINFO_PROXYAUTH_AVAIL.md CURLINFO_PROXYAUTH_USED.md CURLINFO_PROXY_ERROR.md CURLINFO_PROXY_SSL_VERIFYRESULT.md CURLINFO_QUEUE_TIME_T.md CURLINFO_REDIRECT_COUNT.md CURLINFO_REDIRECT_TIME.md CURLINFO_REDIRECT_TIME_T.md CURLINFO_REDIRECT_URL.md CURLINFO_REFERER.md CURLINFO_REQUEST_SIZE.md CURLINFO_RESPONSE_CODE.md CURLINFO_RETRY_AFTER.md CURLINFO_RTSP_CLIENT_CSEQ.md CURLINFO_RTSP_CSEQ_RECV.md CURLINFO_RTSP_SERVER_CSEQ.md CURLINFO_RTSP_SESSION_ID.md CURLINFO_SCHEME.md CURLINFO_SIZE_DELIVERED.md CURLINFO_SIZE_DOWNLOAD.md CURLINFO_SIZE_DOWNLOAD_T.md CURLINFO_SIZE_UPLOAD.md CURLINFO_SIZE_UPLOAD_T.md CURLINFO_SPEED_DOWNLOAD.md CURLINFO_SPEED_DOWNLOAD_T.md CURLINFO_SPEED_UPLOAD.md CURLINFO_SPEED_UPLOAD_T.md CURLINFO_SSL_ENGINES.md CURLINFO_SSL_VERIFYRESULT.md CURLINFO_STARTTRANSFER_TIME.md CURLINFO_STARTTRANSFER_TIME_T.md CURLINFO_TLS_SESSION.md CURLINFO_TLS_SSL_PTR.md CURLINFO_TOTAL_TIME.md CURLINFO_TOTAL_TIME_T.md CURLINFO_USED_PROXY.md CURLINFO_XFER_ID.md CURLMINFO_XFERS_ADDED.md CURLMINFO_XFERS_CURRENT.md CURLMINFO_XFERS_DONE.md CURLMINFO_XFERS_PENDING.md CURLMINFO_XFERS_RUNNING.md CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE.md CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE.md CURLMOPT_MAXCONNECTS.md CURLMOPT_MAX_CONCURRENT_STREAMS.md CURLMOPT_MAX_HOST_CONNECTIONS.md CURLMOPT_MAX_PIPELINE_LENGTH.md CURLMOPT_MAX_TOTAL_CONNECTIONS.md CURLMOPT_NETWORK_CHANGED.md CURLMOPT_NOTIFYDATA.md CURLMOPT_NOTIFYFUNCTION.md CURLMOPT_PIPELINING.md CURLMOPT_PIPELINING_SERVER_BL.md CURLMOPT_PIPELINING_SITE_BL.md CURLMOPT_PUSHDATA.md CURLMOPT_PUSHFUNCTION.md CURLMOPT_QUICK_EXIT.md CURLMOPT_RESOLVE_THREADS_MAX.md CURLMOPT_SOCKETDATA.md CURLMOPT_SOCKETFUNCTION.md CURLMOPT_TIMERDATA.md CURLMOPT_TIMERFUNCTION.md CURLOPT_ABSTRACT_UNIX_SOCKET.md CURLOPT_ACCEPTTIMEOUT_MS.md CURLOPT_ACCEPT_ENCODING.md CURLOPT_ADDRESS_SCOPE.md CURLOPT_ALTSVC.md CURLOPT_ALTSVC_CTRL.md CURLOPT_APPEND.md CURLOPT_AUTOREFERER.md CURLOPT_AWS_SIGV4.md CURLOPT_BUFFERSIZE.md CURLOPT_CAINFO.md CURLOPT_CAINFO_BLOB.md CURLOPT_CAPATH.md CURLOPT_CA_CACHE_TIMEOUT.md CURLOPT_CERTINFO.md CURLOPT_CHUNK_BGN_FUNCTION.md CURLOPT_CHUNK_DATA.md CURLOPT_CHUNK_END_FUNCTION.md CURLOPT_CLOSESOCKETDATA.md CURLOPT_CLOSESOCKETFUNCTION.md CURLOPT_CONNECTTIMEOUT.md CURLOPT_CONNECTTIMEOUT_MS.md CURLOPT_CONNECT_ONLY.md CURLOPT_CONNECT_TO.md CURLOPT_CONV_FROM_NETWORK_FUNCTION.md CURLOPT_CONV_FROM_UTF8_FUNCTION.md CURLOPT_CONV_TO_NETWORK_FUNCTION.md CURLOPT_COOKIE.md CURLOPT_COOKIEFILE.md CURLOPT_COOKIEJAR.md CURLOPT_COOKIELIST.md CURLOPT_COOKIESESSION.md CURLOPT_COPYPOSTFIELDS.md CURLOPT_CRLF.md CURLOPT_CRLFILE.md CURLOPT_CURLU.md CURLOPT_CUSTOMREQUEST.md CURLOPT_DEBUGDATA.md CURLOPT_DEBUGFUNCTION.md CURLOPT_DEFAULT_PROTOCOL.md CURLOPT_DIRLISTONLY.md CURLOPT_DISALLOW_USERNAME_IN_URL.md CURLOPT_DNS_CACHE_TIMEOUT.md CURLOPT_DNS_INTERFACE.md CURLOPT_DNS_LOCAL_IP4.md CURLOPT_DNS_LOCAL_IP6.md CURLOPT_DNS_SERVERS.md CURLOPT_DNS_SHUFFLE_ADDRESSES.md CURLOPT_DNS_USE_GLOBAL_CACHE.md CURLOPT_DOH_SSL_VERIFYHOST.md CURLOPT_DOH_SSL_VERIFYPEER.md CURLOPT_DOH_SSL_VERIFYSTATUS.md CURLOPT_DOH_URL.md CURLOPT_ECH.md CURLOPT_EGDSOCKET.md CURLOPT_ERRORBUFFER.md CURLOPT_EXPECT_100_TIMEOUT_MS.md CURLOPT_FAILONERROR.md CURLOPT_FILETIME.md CURLOPT_FNMATCH_DATA.md CURLOPT_FNMATCH_FUNCTION.md CURLOPT_FOLLOWLOCATION.md CURLOPT_FORBID_REUSE.md CURLOPT_FRESH_CONNECT.md CURLOPT_FTPPORT.md CURLOPT_FTPSSLAUTH.md CURLOPT_FTP_ACCOUNT.md CURLOPT_FTP_ALTERNATIVE_TO_USER.md CURLOPT_FTP_CREATE_MISSING_DIRS.md CURLOPT_FTP_FILEMETHOD.md CURLOPT_FTP_SKIP_PASV_IP.md CURLOPT_FTP_SSL_CCC.md CURLOPT_FTP_USE_EPRT.md CURLOPT_FTP_USE_EPSV.md CURLOPT_FTP_USE_PRET.md CURLOPT_GSSAPI_DELEGATION.md CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS.md CURLOPT_HAPROXYPROTOCOL.md CURLOPT_HAPROXY_CLIENT_IP.md CURLOPT_HEADER.md CURLOPT_HEADERDATA.md CURLOPT_HEADERFUNCTION.md CURLOPT_HEADEROPT.md CURLOPT_HSTS.md CURLOPT_HSTSREADDATA.md CURLOPT_HSTSREADFUNCTION.md CURLOPT_HSTSWRITEDATA.md CURLOPT_HSTSWRITEFUNCTION.md CURLOPT_HSTS_CTRL.md CURLOPT_HTTP09_ALLOWED.md CURLOPT_HTTP200ALIASES.md CURLOPT_HTTPAUTH.md CURLOPT_HTTPGET.md CURLOPT_HTTPHEADER.md CURLOPT_HTTPPOST.md CURLOPT_HTTPPROXYTUNNEL.md CURLOPT_HTTP_CONTENT_DECODING.md CURLOPT_HTTP_TRANSFER_DECODING.md CURLOPT_HTTP_VERSION.md CURLOPT_IGNORE_CONTENT_LENGTH.md CURLOPT_INFILESIZE.md CURLOPT_INFILESIZE_LARGE.md CURLOPT_INTERFACE.md CURLOPT_INTERLEAVEDATA.md CURLOPT_INTERLEAVEFUNCTION.md CURLOPT_IOCTLDATA.md CURLOPT_IOCTLFUNCTION.md CURLOPT_IPRESOLVE.md CURLOPT_ISSUERCERT.md CURLOPT_ISSUERCERT_BLOB.md CURLOPT_KEEP_SENDING_ON_ERROR.md CURLOPT_KEYPASSWD.md CURLOPT_KRBLEVEL.md CURLOPT_LOCALPORT.md CURLOPT_LOCALPORTRANGE.md CURLOPT_LOGIN_OPTIONS.md CURLOPT_LOW_SPEED_LIMIT.md CURLOPT_LOW_SPEED_TIME.md CURLOPT_MAIL_AUTH.md CURLOPT_MAIL_FROM.md CURLOPT_MAIL_RCPT.md CURLOPT_MAIL_RCPT_ALLOWFAILS.md CURLOPT_MAXAGE_CONN.md CURLOPT_MAXCONNECTS.md CURLOPT_MAXFILESIZE.md CURLOPT_MAXFILESIZE_LARGE.md CURLOPT_MAXLIFETIME_CONN.md CURLOPT_MAXREDIRS.md CURLOPT_MAX_RECV_SPEED_LARGE.md CURLOPT_MAX_SEND_SPEED_LARGE.md CURLOPT_MIMEPOST.md CURLOPT_MIME_OPTIONS.md CURLOPT_NETRC.md CURLOPT_NETRC_FILE.md CURLOPT_NEW_DIRECTORY_PERMS.md CURLOPT_NEW_FILE_PERMS.md CURLOPT_NOBODY.md CURLOPT_NOPROGRESS.md CURLOPT_NOPROXY.md CURLOPT_NOSIGNAL.md CURLOPT_OPENSOCKETDATA.md CURLOPT_OPENSOCKETFUNCTION.md CURLOPT_PASSWORD.md CURLOPT_PATH_AS_IS.md CURLOPT_PINNEDPUBLICKEY.md CURLOPT_PIPEWAIT.md CURLOPT_PORT.md CURLOPT_POST.md CURLOPT_POSTFIELDS.md CURLOPT_POSTFIELDSIZE.md CURLOPT_POSTFIELDSIZE_LARGE.md CURLOPT_POSTQUOTE.md CURLOPT_POSTREDIR.md CURLOPT_PREQUOTE.md CURLOPT_PREREQDATA.md CURLOPT_PREREQFUNCTION.md CURLOPT_PRE_PROXY.md CURLOPT_PRIVATE.md CURLOPT_PROGRESSDATA.md CURLOPT_PROGRESSFUNCTION.md CURLOPT_PROTOCOLS.md CURLOPT_PROTOCOLS_STR.md CURLOPT_PROXY.md CURLOPT_PROXYAUTH.md CURLOPT_PROXYHEADER.md CURLOPT_PROXYPASSWORD.md CURLOPT_PROXYPORT.md CURLOPT_PROXYTYPE.md CURLOPT_PROXYUSERNAME.md CURLOPT_PROXYUSERPWD.md CURLOPT_PROXY_CAINFO.md CURLOPT_PROXY_CAINFO_BLOB.md CURLOPT_PROXY_CAPATH.md CURLOPT_PROXY_CRLFILE.md CURLOPT_PROXY_ISSUERCERT.md CURLOPT_PROXY_ISSUERCERT_BLOB.md CURLOPT_PROXY_KEYPASSWD.md CURLOPT_PROXY_PINNEDPUBLICKEY.md CURLOPT_PROXY_SERVICE_NAME.md CURLOPT_PROXY_SSLCERT.md CURLOPT_PROXY_SSLCERTTYPE.md CURLOPT_PROXY_SSLCERT_BLOB.md CURLOPT_PROXY_SSLKEY.md CURLOPT_PROXY_SSLKEYTYPE.md CURLOPT_PROXY_SSLKEY_BLOB.md CURLOPT_PROXY_SSLVERSION.md CURLOPT_PROXY_SSL_CIPHER_LIST.md CURLOPT_PROXY_SSL_OPTIONS.md CURLOPT_PROXY_SSL_VERIFYHOST.md CURLOPT_PROXY_SSL_VERIFYPEER.md CURLOPT_PROXY_TLS13_CIPHERS.md CURLOPT_PROXY_TLSAUTH_PASSWORD.md CURLOPT_PROXY_TLSAUTH_TYPE.md CURLOPT_PROXY_TLSAUTH_USERNAME.md CURLOPT_PROXY_TRANSFER_MODE.md CURLOPT_PUT.md CURLOPT_QUICK_EXIT.md CURLOPT_QUOTE.md CURLOPT_RANDOM_FILE.md CURLOPT_RANGE.md CURLOPT_READDATA.md CURLOPT_READFUNCTION.md CURLOPT_REDIR_PROTOCOLS.md CURLOPT_REDIR_PROTOCOLS_STR.md CURLOPT_REFERER.md CURLOPT_REQUEST_TARGET.md CURLOPT_RESOLVE.md CURLOPT_RESOLVER_START_DATA.md CURLOPT_RESOLVER_START_FUNCTION.md CURLOPT_RESUME_FROM.md CURLOPT_RESUME_FROM_LARGE.md CURLOPT_RTSP_CLIENT_CSEQ.md CURLOPT_RTSP_REQUEST.md CURLOPT_RTSP_SERVER_CSEQ.md CURLOPT_RTSP_SESSION_ID.md CURLOPT_RTSP_STREAM_URI.md CURLOPT_RTSP_TRANSPORT.md CURLOPT_SASL_AUTHZID.md CURLOPT_SASL_IR.md CURLOPT_SEEKDATA.md CURLOPT_SEEKFUNCTION.md CURLOPT_SERVER_RESPONSE_TIMEOUT.md CURLOPT_SERVER_RESPONSE_TIMEOUT_MS.md CURLOPT_SERVICE_NAME.md CURLOPT_SHARE.md CURLOPT_SOCKOPTDATA.md CURLOPT_SOCKOPTFUNCTION.md CURLOPT_SOCKS5_AUTH.md CURLOPT_SOCKS5_GSSAPI_NEC.md CURLOPT_SOCKS5_GSSAPI_SERVICE.md CURLOPT_SSH_AUTH_TYPES.md CURLOPT_SSH_COMPRESSION.md CURLOPT_SSH_HOSTKEYDATA.md CURLOPT_SSH_HOSTKEYFUNCTION.md CURLOPT_SSH_HOST_PUBLIC_KEY_MD5.md CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.md CURLOPT_SSH_KEYDATA.md CURLOPT_SSH_KEYFUNCTION.md CURLOPT_SSH_KNOWNHOSTS.md CURLOPT_SSH_PRIVATE_KEYFILE.md CURLOPT_SSH_PUBLIC_KEYFILE.md CURLOPT_SSLCERT.md CURLOPT_SSLCERTTYPE.md CURLOPT_SSLCERT_BLOB.md CURLOPT_SSLENGINE.md CURLOPT_SSLENGINE_DEFAULT.md CURLOPT_SSLKEY.md CURLOPT_SSLKEYTYPE.md CURLOPT_SSLKEY_BLOB.md CURLOPT_SSLVERSION.md CURLOPT_SSL_CIPHER_LIST.md CURLOPT_SSL_CTX_DATA.md CURLOPT_SSL_CTX_FUNCTION.md CURLOPT_SSL_EC_CURVES.md CURLOPT_SSL_ENABLE_ALPN.md CURLOPT_SSL_ENABLE_NPN.md CURLOPT_SSL_FALSESTART.md CURLOPT_SSL_OPTIONS.md CURLOPT_SSL_SESSIONID_CACHE.md CURLOPT_SSL_SIGNATURE_ALGORITHMS.md CURLOPT_SSL_VERIFYHOST.md CURLOPT_SSL_VERIFYPEER.md CURLOPT_SSL_VERIFYSTATUS.md CURLOPT_STDERR.md CURLOPT_STREAM_DEPENDS.md CURLOPT_STREAM_DEPENDS_E.md CURLOPT_STREAM_WEIGHT.md CURLOPT_SUPPRESS_CONNECT_HEADERS.md CURLOPT_TCP_FASTOPEN.md CURLOPT_TCP_KEEPALIVE.md CURLOPT_TCP_KEEPCNT.md CURLOPT_TCP_KEEPIDLE.md CURLOPT_TCP_KEEPINTVL.md CURLOPT_TCP_NODELAY.md CURLOPT_TELNETOPTIONS.md CURLOPT_TFTP_BLKSIZE.md CURLOPT_TFTP_NO_OPTIONS.md CURLOPT_TIMECONDITION.md CURLOPT_TIMEOUT.md CURLOPT_TIMEOUT_MS.md CURLOPT_TIMEVALUE.md CURLOPT_TIMEVALUE_LARGE.md CURLOPT_TLS13_CIPHERS.md CURLOPT_TLSAUTH_PASSWORD.md CURLOPT_TLSAUTH_TYPE.md CURLOPT_TLSAUTH_USERNAME.md CURLOPT_TRAILERDATA.md CURLOPT_TRAILERFUNCTION.md CURLOPT_TRANSFERTEXT.md CURLOPT_TRANSFER_ENCODING.md CURLOPT_UNIX_SOCKET_PATH.md CURLOPT_UNRESTRICTED_AUTH.md CURLOPT_UPKEEP_INTERVAL_MS.md CURLOPT_UPLOAD.md CURLOPT_UPLOAD_BUFFERSIZE.md CURLOPT_UPLOAD_FLAGS.md CURLOPT_URL.md CURLOPT_USERAGENT.md CURLOPT_USERNAME.md CURLOPT_USERPWD.md CURLOPT_USE_SSL.md CURLOPT_VERBOSE.md CURLOPT_WILDCARDMATCH.md CURLOPT_WRITEDATA.md CURLOPT_WRITEFUNCTION.md CURLOPT_WS_OPTIONS.md CURLOPT_XFERINFODATA.md CURLOPT_XFERINFOFUNCTION.md CURLOPT_XOAUTH2_BEARER.md CURLSHOPT_LOCKFUNC.md CURLSHOPT_SHARE.md CURLSHOPT_UNLOCKFUNC.md CURLSHOPT_UNSHARE.md CURLSHOPT_USERDATA.md Makefile.am Makefile.incinclude
curl
Makefile.am curl.h curlver.h easy.h header.h mprintf.h multi.h options.h stdcheaders.h system.h typecheck-gcc.h urlapi.h websockets.hlib
curlx
base64.c base64.h basename.c basename.h dynbuf.c dynbuf.h fopen.c fopen.h inet_ntop.c inet_ntop.h inet_pton.c inet_pton.h multibyte.c multibyte.h nonblock.c nonblock.h snprintf.c snprintf.h strcopy.c strcopy.h strdup.c strdup.h strerr.c strerr.h strparse.c strparse.h timediff.c timediff.h timeval.c timeval.h version_win32.c version_win32.h wait.c wait.h warnless.c warnless.h winapi.c winapi.hvauth
cleartext.c cram.c digest.c digest.h digest_sspi.c gsasl.c krb5_gssapi.c krb5_sspi.c ntlm.c ntlm_sspi.c oauth2.c spnego_gssapi.c spnego_sspi.c vauth.c vauth.hvquic
curl_ngtcp2.c curl_ngtcp2.h curl_quiche.c curl_quiche.h vquic-tls.c vquic-tls.h vquic.c vquic.h vquic_int.hvtls
apple.c apple.h cipher_suite.c cipher_suite.h gtls.c gtls.h hostcheck.c hostcheck.h keylog.c keylog.h mbedtls.c mbedtls.h openssl.c openssl.h rustls.c rustls.h schannel.c schannel.h schannel_int.h schannel_verify.c vtls.c vtls.h vtls_int.h vtls_scache.c vtls_scache.h vtls_spack.c vtls_spack.h wolfssl.c wolfssl.h x509asn1.c x509asn1.hm4
.gitignore curl-amissl.m4 curl-apple-sectrust.m4 curl-compilers.m4 curl-confopts.m4 curl-functions.m4 curl-gnutls.m4 curl-mbedtls.m4 curl-openssl.m4 curl-override.m4 curl-reentrant.m4 curl-rustls.m4 curl-schannel.m4 curl-sysconfig.m4 curl-wolfssl.m4 xc-am-iface.m4 xc-cc-check.m4 xc-lt-iface.m4 xc-val-flgs.m4 zz40-xc-ovr.m4 zz50-xc-ovr.m4projects
OS400
.checksrc README.OS400 ccsidcurl.c ccsidcurl.h config400.default curl.cmd curl.inc.in curlcl.c curlmain.c initscript.sh make-docs.sh make-include.sh make-lib.sh make-src.sh make-tests.sh makefile.sh os400sys.c os400sys.hWindows
tmpl
.gitattributes README.txt curl-all.sln curl.sln curl.vcxproj curl.vcxproj.filters libcurl.sln libcurl.vcxproj libcurl.vcxproj.filtersvms
Makefile.am backup_gnv_curl_src.com build_curl-config_script.com build_gnv_curl.com build_gnv_curl_pcsi_desc.com build_gnv_curl_pcsi_text.com build_gnv_curl_release_notes.com build_libcurl_pc.com build_vms.com clean_gnv_curl.com compare_curl_source.com config_h.com curl_crtl_init.c curl_gnv_build_steps.txt curl_release_note_start.txt curl_startup.com curlmsg.h curlmsg.msg curlmsg.sdl curlmsg_vms.h generate_config_vms_h_curl.com generate_vax_transfer.com gnv_conftest.c_first gnv_curl_configure.sh gnv_libcurl_symbols.opt gnv_link_curl.com macro32_exactcase.patch make_gnv_curl_install.sh make_pcsi_curl_kit_name.com pcsi_gnv_curl_file_list.txt pcsi_product_gnv_curl.com readme report_openssl_version.c setup_gnv_curl_build.com stage_curl_install.com vms_eco_level.hscripts
.checksrc CMakeLists.txt Makefile.am badwords badwords-all badwords.txt cd2cd cd2nroff cdall checksrc-all.pl checksrc.pl cmakelint.sh completion.pl contributors.sh contrithanks.sh coverage.sh delta dmaketgz extract-unit-protos firefox-db2pem.sh installcheck.sh maketgz managen mdlinkcheck mk-ca-bundle.pl mk-unity.pl nroff2cd perlcheck.sh pythonlint.sh randdisable release-notes.pl release-tools.sh schemetable.c singleuse.pl spacecheck.pl top-complexity top-length verify-release wcurlsrc
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc config2setopts.c config2setopts.h curl.rc curlinfo.c mk-file-embed.pl mkhelp.pl slist_wc.c slist_wc.h terminal.c terminal.h tool_cb_dbg.c tool_cb_dbg.h tool_cb_hdr.c tool_cb_hdr.h tool_cb_prg.c tool_cb_prg.h tool_cb_rea.c tool_cb_rea.h tool_cb_see.c tool_cb_see.h tool_cb_soc.c tool_cb_soc.h tool_cb_wrt.c tool_cb_wrt.h tool_cfgable.c tool_cfgable.h tool_dirhie.c tool_dirhie.h tool_doswin.c tool_doswin.h tool_easysrc.c tool_easysrc.h tool_filetime.c tool_filetime.h tool_findfile.c tool_findfile.h tool_formparse.c tool_formparse.h tool_getparam.c tool_getparam.h tool_getpass.c tool_getpass.h tool_help.c tool_help.h tool_helpers.c tool_helpers.h tool_hugehelp.h tool_ipfs.c tool_ipfs.h tool_libinfo.c tool_libinfo.h tool_listhelp.c tool_main.c tool_main.h tool_msgs.c tool_msgs.h tool_operate.c tool_operate.h tool_operhlp.c tool_operhlp.h tool_paramhlp.c tool_paramhlp.h tool_parsecfg.c tool_parsecfg.h tool_progress.c tool_progress.h tool_sdecls.h tool_setopt.c tool_setopt.h tool_setup.h tool_ssls.c tool_ssls.h tool_stderr.c tool_stderr.h tool_urlglob.c tool_urlglob.h tool_util.c tool_util.h tool_version.h tool_vms.c tool_vms.h tool_writeout.c tool_writeout.h tool_writeout_json.c tool_writeout_json.h tool_xattr.c tool_xattr.h var.c var.htests
certs
.gitignore CMakeLists.txt Makefile.am Makefile.inc genserv.pl srp-verifier-conf srp-verifier-db test-ca.cnf test-ca.prm test-client-cert.prm test-client-eku-only.prm test-localhost-san-first.prm test-localhost-san-last.prm test-localhost.nn.prm test-localhost.prm test-localhost0h.prmdata
.gitignore DISABLED Makefile.am data-xml1 data1400.c data1401.c data1402.c data1403.c data1404.c data1405.c data1406.c data1407.c data1420.c data1461.txt data1463.txt data1465.c data1481.c data1705-1.md data1705-2.md data1705-3.md data1705-4.md data1705-stdout.1 data1706-1.md data1706-2.md data1706-3.md data1706-4.md data1706-stdout.txt data320.html test1 test10 test100 test1000 test1001 test1002 test1003 test1004 test1005 test1006 test1007 test1008 test1009 test101 test1010 test1011 test1012 test1013 test1014 test1015 test1016 test1017 test1018 test1019 test102 test1020 test1021 test1022 test1023 test1024 test1025 test1026 test1027 test1028 test1029 test103 test1030 test1031 test1032 test1033 test1034 test1035 test1036 test1037 test1038 test1039 test104 test1040 test1041 test1042 test1043 test1044 test1045 test1046 test1047 test1048 test1049 test105 test1050 test1051 test1052 test1053 test1054 test1055 test1056 test1057 test1058 test1059 test106 test1060 test1061 test1062 test1063 test1064 test1065 test1066 test1067 test1068 test1069 test107 test1070 test1071 test1072 test1073 test1074 test1075 test1076 test1077 test1078 test1079 test108 test1080 test1081 test1082 test1083 test1084 test1085 test1086 test1087 test1088 test1089 test109 test1090 test1091 test1092 test1093 test1094 test1095 test1096 test1097 test1098 test1099 test11 test110 test1100 test1101 test1102 test1103 test1104 test1105 test1106 test1107 test1108 test1109 test111 test1110 test1111 test1112 test1113 test1114 test1115 test1116 test1117 test1118 test1119 test112 test1120 test1121 test1122 test1123 test1124 test1125 test1126 test1127 test1128 test1129 test113 test1130 test1131 test1132 test1133 test1134 test1135 test1136 test1137 test1138 test1139 test114 test1140 test1141 test1142 test1143 test1144 test1145 test1146 test1147 test1148 test1149 test115 test1150 test1151 test1152 test1153 test1154 test1155 test1156 test1157 test1158 test1159 test116 test1160 test1161 test1162 test1163 test1164 test1165 test1166 test1167 test1168 test1169 test117 test1170 test1171 test1172 test1173 test1174 test1175 test1176 test1177 test1178 test1179 test118 test1180 test1181 test1182 test1183 test1184 test1185 test1186 test1187 test1188 test1189 test119 test1190 test1191 test1192 test1193 test1194 test1195 test1196 test1197 test1198 test1199 test12 test120 test1200 test1201 test1202 test1203 test1204 test1205 test1206 test1207 test1208 test1209 test121 test1210 test1211 test1212 test1213 test1214 test1215 test1216 test1217 test1218 test1219 test122 test1220 test1221 test1222 test1223 test1224 test1225 test1226 test1227 test1228 test1229 test123 test1230 test1231 test1232 test1233 test1234 test1235 test1236 test1237 test1238 test1239 test124 test1240 test1241 test1242 test1243 test1244 test1245 test1246 test1247 test1248 test1249 test125 test1250 test1251 test1252 test1253 test1254 test1255 test1256 test1257 test1258 test1259 test126 test1260 test1261 test1262 test1263 test1264 test1265 test1266 test1267 test1268 test1269 test127 test1270 test1271 test1272 test1273 test1274 test1275 test1276 test1277 test1278 test1279 test128 test1280 test1281 test1282 test1283 test1284 test1285 test1286 test1287 test1288 test1289 test129 test1290 test1291 test1292 test1293 test1294 test1295 test1296 test1297 test1298 test1299 test13 test130 test1300 test1301 test1302 test1303 test1304 test1305 test1306 test1307 test1308 test1309 test131 test1310 test1311 test1312 test1313 test1314 test1315 test1316 test1317 test1318 test1319 test132 test1320 test1321 test1322 test1323 test1324 test1325 test1326 test1327 test1328 test1329 test133 test1330 test1331 test1332 test1333 test1334 test1335 test1336 test1337 test1338 test1339 test134 test1340 test1341 test1342 test1343 test1344 test1345 test1346 test1347 test1348 test1349 test135 test1350 test1351 test1352 test1353 test1354 test1355 test1356 test1357 test1358 test1359 test136 test1360 test1361 test1362 test1363 test1364 test1365 test1366 test1367 test1368 test1369 test137 test1370 test1371 test1372 test1373 test1374 test1375 test1376 test1377 test1378 test1379 test138 test1380 test1381 test1382 test1383 test1384 test1385 test1386 test1387 test1388 test1389 test139 test1390 test1391 test1392 test1393 test1394 test1395 test1396 test1397 test1398 test1399 test14 test140 test1400 test1401 test1402 test1403 test1404 test1405 test1406 test1407 test1408 test1409 test141 test1410 test1411 test1412 test1413 test1414 test1415 test1416 test1417 test1418 test1419 test142 test1420 test1421 test1422 test1423 test1424 test1425 test1426 test1427 test1428 test1429 test143 test1430 test1431 test1432 test1433 test1434 test1435 test1436 test1437 test1438 test1439 test144 test1440 test1441 test1442 test1443 test1444 test1445 test1446 test1447 test1448 test1449 test145 test1450 test1451 test1452 test1453 test1454 test1455 test1456 test1457 test1458 test1459 test146 test1460 test1461 test1462 test1463 test1464 test1465 test1466 test1467 test1468 test1469 test147 test1470 test1471 test1472 test1473 test1474 test1475 test1476 test1477 test1478 test1479 test148 test1480 test1481 test1482 test1483 test1484 test1485 test1486 test1487 test1488 test1489 test149 test1490 test1491 test1492 test1493 test1494 test1495 test1496 test1497 test1498 test1499 test15 test150 test1500 test1501 test1502 test1503 test1504 test1505 test1506 test1507 test1508 test1509 test151 test1510 test1511 test1512 test1513 test1514 test1515 test1516 test1517 test1518 test1519 test152 test1520 test1521 test1522 test1523 test1524 test1525 test1526 test1527 test1528 test1529 test153 test1530 test1531 test1532 test1533 test1534 test1535 test1536 test1537 test1538 test1539 test154 test1540 test1541 test1542 test1543 test1544 test1545 test1546 test1547 test1548 test1549 test155 test1550 test1551 test1552 test1553 test1554 test1555 test1556 test1557 test1558 test1559 test156 test1560 test1561 test1562 test1563 test1564 test1565 test1566 test1567 test1568 test1569 test157 test1570 test1571 test1572 test1573 test1574 test1575 test1576 test1577 test1578 test1579 test158 test1580 test1581 test1582 test1583 test1584 test1585 test1586 test1587 test1588 test1589 test159 test1590 test1591 test1592 test1593 test1594 test1595 test1596 test1597 test1598 test1599 test16 test160 test1600 test1601 test1602 test1603 test1604 test1605 test1606 test1607 test1608 test1609 test161 test1610 test1611 test1612 test1613 test1614 test1615 test1616 test1617 test1618 test1619 test162 test1620 test1621 test1622 test1623 test1624 test1625 test1626 test1627 test1628 test1629 test163 test1630 test1631 test1632 test1633 test1634 test1635 test1636 test1637 test1638 test1639 test164 test1640 test1641 test1642 test1643 test1644 test1645 test165 test1650 test1651 test1652 test1653 test1654 test1655 test1656 test1657 test1658 test1659 test166 test1660 test1661 test1662 test1663 test1664 test1665 test1666 test1667 test1668 test1669 test167 test1670 test1671 test1672 test1673 test1674 test1675 test1676 test168 test1680 test1681 test1682 test1683 test1684 test1685 test169 test17 test170 test1700 test1701 test1702 test1703 test1704 test1705 test1706 test1707 test1708 test1709 test171 test1710 test1711 test1712 test1713 test1714 test1715 test172 test1720 test1721 test173 test174 test175 test176 test177 test178 test179 test18 test180 test1800 test1801 test1802 test181 test182 test183 test184 test1847 test1848 test1849 test185 test1850 test1851 test186 test187 test188 test189 test19 test190 test1900 test1901 test1902 test1903 test1904 test1905 test1906 test1907 test1908 test1909 test191 test1910 test1911 test1912 test1913 test1914 test1915 test1916 test1917 test1918 test1919 test192 test1920 test1921 test193 test1933 test1934 test1935 test1936 test1937 test1938 test1939 test194 test1940 test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 test195 test1955 test1956 test1957 test1958 test1959 test196 test1960 test1964 test1965 test1966 test197 test1970 test1971 test1972 test1973 test1974 test1975 test1976 test1977 test1978 test1979 test198 test1980 test1981 test1982 test1983 test1984 test199 test2 test20 test200 test2000 test2001 test2002 test2003 test2004 test2005 test2006 test2007 test2008 test2009 test201 test2010 test2011 test2012 test2013 test2014 test202 test2023 test2024 test2025 test2026 test2027 test2028 test2029 test203 test2030 test2031 test2032 test2033 test2034 test2035 test2037 test2038 test2039 test204 test2040 test2041 test2042 test2043 test2044 test2045 test2046 test2047 test2048 test2049 test205 test2050 test2051 test2052 test2053 test2054 test2055 test2056 test2057 test2058 test2059 test206 test2060 test2061 test2062 test2063 test2064 test2065 test2066 test2067 test2068 test2069 test207 test2070 test2071 test2072 test2073 test2074 test2075 test2076 test2077 test2078 test2079 test208 test2080 test2081 test2082 test2083 test2084 test2085 test2086 test2087 test2088 test2089 test209 test2090 test2091 test2092 test21 test210 test2100 test2101 test2102 test2103 test2104 test211 test212 test213 test214 test215 test216 test217 test218 test219 test22 test220 test2200 test2201 test2202 test2203 test2204 test2205 test2206 test2207 test221 test222 test223 test224 test225 test226 test227 test228 test229 test23 test230 test2300 test2301 test2302 test2303 test2304 test2306 test2307 test2308 test2309 test231 test232 test233 test234 test235 test236 test237 test238 test239 test24 test240 test2400 test2401 test2402 test2403 test2404 test2405 test2406 test2407 test2408 test2409 test241 test2410 test2411 test242 test243 test244 test245 test246 test247 test248 test249 test25 test250 test2500 test2501 test2502 test2503 test2504 test2505 test2506 test251 test252 test253 test254 test255 test256 test257 test258 test259 test26 test260 test2600 test2601 test2602 test2603 test2604 test2605 test261 test262 test263 test264 test265 test266 test267 test268 test269 test27 test270 test2700 test2701 test2702 test2703 test2704 test2705 test2706 test2707 test2708 test2709 test271 test2710 test2711 test2712 test2713 test2714 test2715 test2716 test2717 test2718 test2719 test272 test2720 test2721 test2722 test2723 test273 test274 test275 test276 test277 test278 test279 test28 test280 test281 test282 test283 test284 test285 test286 test287 test288 test289 test29 test290 test291 test292 test293 test294 test295 test296 test297 test298 test299 test3 test30 test300 test3000 test3001 test3002 test3003 test3004 test3005 test3006 test3007 test3008 test3009 test301 test3010 test3011 test3012 test3013 test3014 test3015 test3016 test3017 test3018 test3019 test302 test3020 test3021 test3022 test3023 test3024 test3025 test3026 test3027 test3028 test3029 test303 test3030 test3031 test3032 test3033 test3034 test3035 test3036 test304 test305 test306 test307 test308 test309 test31 test310 test3100 test3101 test3102 test3103 test3104 test3105 test3106 test311 test312 test313 test314 test315 test316 test317 test318 test319 test32 test320 test3200 test3201 test3202 test3203 test3204 test3205 test3206 test3207 test3208 test3209 test321 test3210 test3211 test3212 test3213 test3214 test3215 test3216 test3217 test3218 test3219 test322 test3220 test323 test324 test325 test326 test327 test328 test329 test33 test330 test3300 test3301 test3302 test331 test332 test333 test334 test335 test336 test337 test338 test339 test34 test340 test341 test342 test343 test344 test345 test346 test347 test348 test349 test35 test350 test351 test352 test353 test354 test355 test356 test357 test358 test359 test36 test360 test361 test362 test363 test364 test365 test366 test367 test368 test369 test37 test370 test371 test372 test373 test374 test375 test376 test378 test379 test38 test380 test381 test383 test384 test385 test386 test387 test388 test389 test39 test390 test391 test392 test393 test394 test395 test396 test397 test398 test399 test4 test40 test400 test4000 test4001 test401 test402 test403 test404 test405 test406 test407 test408 test409 test41 test410 test411 test412 test413 test414 test415 test416 test417 test418 test419 test42 test420 test421 test422 test423 test424 test425 test426 test427 test428 test429 test43 test430 test431 test432 test433 test434 test435 test436 test437 test438 test439 test44 test440 test441 test442 test443 test444 test445 test446 test447 test448 test449 test45 test450 test451 test452 test453 test454 test455 test456 test457 test458 test459 test46 test460 test461 test462 test463 test467 test468 test469 test47 test470 test471 test472 test473 test474 test475 test476 test477 test478 test479 test48 test480 test481 test482 test483 test484 test485 test486 test487 test488 test489 test49 test490 test491 test492 test493 test494 test495 test496 test497 test498 test499 test5 test50 test500 test501 test502 test503 test504 test505 test506 test507 test508 test509 test51 test510 test511 test512 test513 test514 test515 test516 test517 test518 test519 test52 test520 test521 test522 test523 test524 test525 test526 test527 test528 test529 test53 test530 test531 test532 test533 test534 test535 test536 test537 test538 test539 test54 test540 test541 test542 test543 test544 test545 test546 test547 test548 test549 test55 test550 test551 test552 test553 test554 test555 test556 test557 test558 test559 test56 test560 test561 test562 test563 test564 test565 test566 test567 test568 test569 test57 test570 test571 test572 test573 test574 test575 test576 test577 test578 test579 test58 test580 test581 test582 test583 test584 test585 test586 test587 test588 test589 test59 test590 test591 test592 test593 test594 test595 test596 test597 test598 test599 test6 test60 test600 test601 test602 test603 test604 test605 test606 test607 test608 test609 test61 test610 test611 test612 test613 test614 test615 test616 test617 test618 test619 test62 test620 test621 test622 test623 test624 test625 test626 test627 test628 test629 test63 test630 test631 test632 test633 test634 test635 test636 test637 test638 test639 test64 test640 test641 test642 test643 test644 test645 test646 test647 test648 test649 test65 test650 test651 test652 test653 test654 test655 test656 test658 test659 test66 test660 test661 test662 test663 test664 test665 test666 test667 test668 test669 test67 test670 test671 test672 test673 test674 test675 test676 test677 test678 test679 test68 test680 test681 test682 test683 test684 test685 test686 test687 test688 test689 test69 test690 test691 test692 test693 test694 test695 test696 test697 test698 test699 test7 test70 test700 test701 test702 test703 test704 test705 test706 test707 test708 test709 test71 test710 test711 test712 test713 test714 test715 test716 test717 test718 test719 test72 test720 test721 test722 test723 test724 test725 test726 test727 test728 test729 test73 test730 test731 test732 test733 test734 test735 test736 test737 test738 test739 test74 test740 test741 test742 test743 test744 test745 test746 test747 test748 test749 test75 test750 test751 test752 test753 test754 test755 test756 test757 test758 test759 test76 test760 test761 test762 test763 test764 test765 test766 test767 test768 test769 test77 test770 test771 test772 test773 test774 test775 test776 test777 test778 test779 test78 test780 test781 test782 test783 test784 test785 test786 test787 test788 test789 test79 test790 test791 test792 test793 test794 test795 test796 test797 test798 test799 test8 test80 test800 test801 test802 test803 test804 test805 test806 test807 test808 test809 test81 test810 test811 test812 test813 test814 test815 test816 test817 test818 test819 test82 test820 test821 test822 test823 test824 test825 test826 test827 test828 test829 test83 test830 test831 test832 test833 test834 test835 test836 test837 test838 test839 test84 test840 test841 test842 test843 test844 test845 test846 test847 test848 test849 test85 test850 test851 test852 test853 test854 test855 test856 test857 test858 test859 test86 test860 test861 test862 test863 test864 test865 test866 test867 test868 test869 test87 test870 test871 test872 test873 test874 test875 test876 test877 test878 test879 test88 test880 test881 test882 test883 test884 test885 test886 test887 test888 test889 test89 test890 test891 test892 test893 test894 test895 test896 test897 test898 test899 test9 test90 test900 test901 test902 test903 test904 test905 test906 test907 test908 test909 test91 test910 test911 test912 test913 test914 test915 test916 test917 test918 test919 test92 test920 test921 test922 test923 test924 test925 test926 test927 test928 test929 test93 test930 test931 test932 test933 test934 test935 test936 test937 test938 test939 test94 test940 test941 test942 test943 test944 test945 test946 test947 test948 test949 test95 test950 test951 test952 test953 test954 test955 test956 test957 test958 test959 test96 test960 test961 test962 test963 test964 test965 test966 test967 test968 test969 test97 test970 test971 test972 test973 test974 test975 test976 test977 test978 test979 test98 test980 test981 test982 test983 test984 test985 test986 test987 test988 test989 test99 test990 test991 test992 test993 test994 test995 test996 test997 test998 test999http
testenv
__init__.py caddy.py certs.py client.py curl.py dante.py dnsd.py env.py httpd.py nghttpx.py ports.py sshd.py vsftpd.py ws_echo_server.pylibtest
.gitignore CMakeLists.txt Makefile.am Makefile.inc cli_ftp_upload.c cli_h2_pausing.c cli_h2_serverpush.c cli_h2_upgrade_extreme.c cli_hx_download.c cli_hx_upload.c cli_tls_session_reuse.c cli_upload_pausing.c cli_ws_data.c cli_ws_pingpong.c first.c first.h lib1156.c lib1301.c lib1308.c lib1485.c lib1500.c lib1501.c lib1502.c lib1506.c lib1507.c lib1508.c lib1509.c lib1510.c lib1511.c lib1512.c lib1513.c lib1514.c lib1515.c lib1517.c lib1518.c lib1520.c lib1522.c lib1523.c lib1525.c lib1526.c lib1527.c lib1528.c lib1529.c lib1530.c lib1531.c lib1532.c lib1533.c lib1534.c lib1535.c lib1536.c lib1537.c lib1538.c lib1540.c lib1541.c lib1542.c lib1545.c lib1549.c lib1550.c lib1551.c lib1552.c lib1553.c lib1554.c lib1555.c lib1556.c lib1557.c lib1558.c lib1559.c lib1560.c lib1564.c lib1565.c lib1567.c lib1568.c lib1569.c lib1571.c lib1576.c lib1582.c lib1587.c lib1588.c lib1589.c lib1591.c lib1592.c lib1593.c lib1594.c lib1597.c lib1598.c lib1599.c lib1662.c lib1900.c lib1901.c lib1902.c lib1903.c lib1905.c lib1906.c lib1907.c lib1908.c lib1910.c lib1911.c lib1912.c lib1913.c lib1915.c lib1916.c lib1918.c lib1919.c lib1920.c lib1921.c lib1933.c lib1934.c lib1935.c lib1936.c lib1937.c lib1938.c lib1939.c lib1940.c lib1945.c lib1947.c lib1948.c lib1955.c lib1956.c lib1957.c lib1958.c lib1959.c lib1960.c lib1964.c lib1965.c lib1970.c lib1971.c lib1972.c lib1973.c lib1974.c lib1975.c lib1977.c lib1978.c lib2023.c lib2032.c lib2082.c lib2301.c lib2302.c lib2304.c lib2306.c lib2308.c lib2309.c lib2402.c lib2404.c lib2405.c lib2502.c lib2504.c lib2505.c lib2506.c lib2700.c lib3010.c lib3025.c lib3026.c lib3027.c lib3033.c lib3034.c lib3100.c lib3101.c lib3102.c lib3103.c lib3104.c lib3105.c lib3207.c lib3208.c lib500.c lib501.c lib502.c lib503.c lib504.c lib505.c lib506.c lib507.c lib508.c lib509.c lib510.c lib511.c lib512.c lib513.c lib514.c lib515.c lib516.c lib517.c lib518.c lib519.c lib520.c lib521.c lib523.c lib524.c lib525.c lib526.c lib530.c lib533.c lib536.c lib537.c lib539.c lib540.c lib541.c lib542.c lib543.c lib544.c lib547.c lib549.c lib552.c lib553.c lib554.c lib555.c lib556.c lib557.c lib558.c lib559.c lib560.c lib562.c lib564.c lib566.c lib567.c lib568.c lib569.c lib570.c lib571.c lib572.c lib573.c lib574.c lib575.c lib576.c lib578.c lib579.c lib582.c lib583.c lib586.c lib589.c lib590.c lib591.c lib597.c lib598.c lib599.c lib643.c lib650.c lib651.c lib652.c lib653.c lib654.c lib655.c lib658.c lib659.c lib661.c lib666.c lib667.c lib668.c lib670.c lib674.c lib676.c lib677.c lib678.c lib694.c lib695.c lib751.c lib753.c lib757.c lib758.c lib766.c memptr.c mk-lib1521.pl test1013.pl test1022.pl test307.pl test610.pl test613.pl testtrace.c testtrace.h testutil.c testutil.h unitcheck.hserver
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc dnsd.c first.c first.h getpart.c mqttd.c resolve.c rtspd.c sockfilt.c socksd.c sws.c tftpd.c util.ctunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md tool1394.c tool1604.c tool1621.c tool1622.c tool1623.c tool1720.cunit
.gitignore CMakeLists.txt Makefile.am Makefile.inc README.md unit1300.c unit1302.c unit1303.c unit1304.c unit1305.c unit1307.c unit1309.c unit1323.c unit1330.c unit1395.c unit1396.c unit1397.c unit1398.c unit1399.c unit1600.c unit1601.c unit1602.c unit1603.c unit1605.c unit1606.c unit1607.c unit1608.c unit1609.c unit1610.c unit1611.c unit1612.c unit1614.c unit1615.c unit1616.c unit1620.c unit1625.c unit1626.c unit1627.c unit1636.c unit1650.c unit1651.c unit1652.c unit1653.c unit1654.c unit1655.c unit1656.c unit1657.c unit1658.c unit1660.c unit1661.c unit1663.c unit1664.c unit1666.c unit1667.c unit1668.c unit1669.c unit1674.c unit1675.c unit1676.c unit1979.c unit1980.c unit2600.c unit2601.c unit2602.c unit2603.c unit2604.c unit2605.c unit3200.c unit3205.c unit3211.c unit3212.c unit3213.c unit3214.c unit3216.c unit3219.c unit3300.c unit3301.c unit3302.cexamples
.env config.ini crypto_test.lua env_test.lua fs_example.lua http_server.lua https_test.lua ini_example.lua json.lua log.lua path_fs_example.lua process_example.lua request_download.lua request_test.lua run_all.lua sqlite_example.lua sqlite_http_template.lua stash_test.lua template_test.lua timer.lua websocket.luainiparser
example
iniexample.c iniwrite.c parse.c twisted-errors.ini twisted-genhuge.py twisted-ofkey.ini twisted-ofval.ini twisted.initest
CMakeLists.txt test_dictionary.c test_iniparser.c unity-config.yml unity_config.hjinjac
libjinjac
src
CMakeLists.txt ast.c ast.h block_statement.c block_statement.h buffer.c buffer.h buildin.c buildin.h common.h convert.c convert.h flex_decl.h jfunction.c jfunction.h jinja_expression.l jinja_expression.y jinjac_parse.c jinjac_parse.h jinjac_stream.c jinjac_stream.h jlist.c jlist.h jobject.c jobject.h parameter.c parameter.h str_obj.c str_obj.h trace.c trace.htest
.gitignore CMakeLists.txt autotest.rb test_01.expected test_01.jinja test_01b.expected test_01b.jinja test_01c.expected test_01c.jinja test_01d.expected test_01d.jinja test_02.expected test_02.jinja test_03.expected test_03.jinja test_04.expected test_04.jinja test_05.expected test_05.jinja test_06.expected test_06.jinja test_07.expected test_07.jinja test_08.expected test_08.jinja test_08b.expected test_08b.jinja test_09.expected test_09.jinja test_10.expected test_10.jinja test_11.expected test_11.jinja test_12.expected test_12.jinja test_13.expected test_13.jinja test_14.expected test_14.jinja test_15.expected test_15.jinja test_16.expected test_16.jinja test_17.expected test_17.jinja test_18.expected test_18.jinja test_18b.expected test_18b.jinja test_18c.expected test_18c.jinja test_19.expected test_19.jinja test_19b.expected test_19b.jinja test_19c.expected test_19c.jinja test_19d.expected test_19d.jinja test_19e.expected test_19e.jinja test_19f.expected test_19f.jinja test_20.expected test_20.jinja test_21.expected test_21.jinja test_22.expected test_22.jinja test_22a.expected test_22a.jinja test_22b.expected test_22b.jinja test_23.expected test_23.jinja test_24.expected test_24.jinjalibev
Changes LICENSE Makefile Makefile.am Makefile.in README Symbols.ev Symbols.event aclocal.m4 autogen.sh compile config.guess config.h config.h.in config.status config.sub configure configure.ac depcomp ev++.h ev.3 ev.c ev.h ev.pod ev_epoll.c ev_kqueue.c ev_poll.c ev_port.c ev_select.c ev_vars.h ev_win32.c ev_wrap.h event.c event.h install-sh libev.m4 libtool ltmain.sh missing mkinstalldirs stamp-h1luajit
doc
bluequad-print.css bluequad.css contact.html ext_buffer.html ext_c_api.html ext_ffi.html ext_ffi_api.html ext_ffi_semantics.html ext_ffi_tutorial.html ext_jit.html ext_profiler.html extensions.html install.html luajit.html running.htmldynasm
dasm_arm.h dasm_arm.lua dasm_arm64.h dasm_arm64.lua dasm_mips.h dasm_mips.lua dasm_mips64.lua dasm_ppc.h dasm_ppc.lua dasm_proto.h dasm_x64.lua dasm_x86.h dasm_x86.lua dynasm.luasrc
host
.gitignore README buildvm.c buildvm.h buildvm_asm.c buildvm_fold.c buildvm_lib.c buildvm_libbc.h buildvm_peobj.c genlibbc.lua genminilua.lua genversion.lua minilua.cjit
.gitignore bc.lua bcsave.lua dis_arm.lua dis_arm64.lua dis_arm64be.lua dis_mips.lua dis_mips64.lua dis_mips64el.lua dis_mips64r6.lua dis_mips64r6el.lua dis_mipsel.lua dis_ppc.lua dis_x64.lua dis_x86.lua dump.lua p.lua v.lua zone.luawolfssl
.github
workflows
ada.yml arduino.yml async-examples.yml async.yml atecc608-sim.yml bind.yml cmake-autoconf.yml cmake.yml codespell.yml coverity-scan-fixes.yml cryptocb-only.yml curl.yml cyrus-sasl.yml disable-pk-algs.yml docker-Espressif.yml docker-OpenWrt.yml emnet-nonblock.yml fil-c.yml freertos-mem-track.yml gencertbuf.yml grpc.yml haproxy.yml hostap-vm.yml intelasm-c-fallback.yml ipmitool.yml jwt-cpp.yml krb5.yml libspdm.yml libssh2.yml libvncserver.yml linuxkm.yml macos-apple-native-cert-validation.yml mbedtls.sh mbedtls.yml membrowse-comment.yml membrowse-onboard.yml membrowse-report.yml memcached.sh memcached.yml mono.yml mosquitto.yml msmtp.yml msys2.yml multi-arch.yml multi-compiler.yml net-snmp.yml nginx.yml no-malloc.yml no-tls.yml nss.sh nss.yml ntp.yml ocsp.yml openldap.yml openssh.yml openssl-ech.yml opensslcoexist.yml openvpn.yml os-check.yml packaging.yml pam-ipmi.yml pq-all.yml pr-commit-check.yml psk.yml puf.yml python.yml rng-tools.yml rust-wrapper.yml se050-sim.yml smallStackSize.yml socat.yml softhsm.yml sssd.yml stm32-sim.yml stsafe-a120-sim.yml stunnel.yml symbol-prefixes.yml threadx.yml tls-anvil.yml trackmemory.yml watcomc.yml win-csharp-test.yml wolfCrypt-Wconversion.yml wolfboot-integration.yml wolfsm.yml xcode.yml zephyr-4.x.yml zephyr.ymlIDE
ARDUINO
Arduino_README_prepend.md README.md include.am keywords.txt library.properties.template wolfssl-arduino.cpp wolfssl-arduino.sh wolfssl.hECLIPSE
Espressif
ESP-IDF
examples
template
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266wolfssl_benchmark
VisualGDB
wolfssl_benchmark_IDF_v4.4_ESP32.sln wolfssl_benchmark_IDF_v4.4_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32.sln wolfssl_benchmark_IDF_v5_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32C3.sln wolfssl_benchmark_IDF_v5_ESP32C3.vgdbproj wolfssl_benchmark_IDF_v5_ESP32S3.sln wolfssl_benchmark_IDF_v5_ESP32S3.vgdbprojwolfssl_client
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_client_ESP8266.vgdbprojwolfssl_server
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_server_ESP8266.vgdbprojwolfssl_test
VisualGDB
wolfssl_test-IDF_v5_ESP32.sln wolfssl_test-IDF_v5_ESP32.vgdbproj wolfssl_test-IDF_v5_ESP32C3.sln wolfssl_test-IDF_v5_ESP32C3.vgdbproj wolfssl_test-IDF_v5_ESP32C6.sln wolfssl_test-IDF_v5_ESP32C6.vgdbproj wolfssl_test_IDF_v5_ESP32S3.sln wolfssl_test_IDF_v5_ESP32S3.vgdbprojGCC-ARM
Makefile Makefile.bench Makefile.client Makefile.common Makefile.server Makefile.static Makefile.test README.md include.am linker.ld linker_fips.ldIAR-EWARM
embOS
SAMV71_XULT
embOS_SAMV71_XULT_user_settings
user_settings.h user_settings_simple_example.h user_settings_verbose_example.hembOS_wolfcrypt_benchmark_SAMV71_XULT
README_wolfcrypt_benchmark wolfcrypt_benchmark.ewd wolfcrypt_benchmark.ewpINTIME-RTOS
Makefile README.md include.am libwolfssl.c libwolfssl.vcxproj user_settings.h wolfExamples.c wolfExamples.h wolfExamples.sln wolfExamples.vcxproj wolfssl-lib.sln wolfssl-lib.vcxprojMQX
Makefile README-jp.md README.md client-tls.c include.am server-tls.c user_config.h user_settings.hMSVS-2019-AZSPHERE
wolfssl_new_azsphere
.gitignore CMakeLists.txt CMakeSettings.json app_manifest.json applibs_versions.h launch.vs.json main.cNETOS
Makefile.wolfcrypt.inc README.md include.am user_settings.h user_settings.h-cert2425 user_settings.h-cert3389 wolfssl_netos_custom.cPlatformIO
examples
wolfssl_benchmark
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_benchmark.code-workspaceROWLEY-CROSSWORKS-ARM
Kinetis_FlashPlacement.xml README.md arm_startup.c benchmark_main.c hw.h include.am kinetis_hw.c retarget.c test_main.c user_settings.h wolfssl.hzp wolfssl_ltc.hzpRenesas
e2studio
RA6M3
README.md README_APRA6M_en.md README_APRA6M_jp.md include.amRX72N
EnvisionKit
Simple
README_EN.md README_JP.mdwolfssl_demo
key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h wolfssl_tsip_unit_test.cSTM32Cube
README.md STM32_Benchmarks.md default_conf.ftl include.am main.c wolfssl_example.c wolfssl_example.hWIN
README.txt include.am test.vcxproj user_settings.h user_settings_dtls.h wolfssl-fips.sln wolfssl-fips.vcxprojWIN-SRTP-KDF-140-3
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojWIN10
README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxprojXCODE
Benchmark
include.amXilinxSDK
README.md bench.sh combine.sh eclipse_formatter_profile.xml graph.sh include.am user_settings.h wolfssl_example.capple-universal
wolfssl-multiplatform
iotsafe
Makefile README.md ca-cert.c devices.c devices.h include.am main.c memory-tls.c startup.c target.ld user_settings.hmynewt
README.md apps.wolfcrypttest.pkg.yml crypto.wolfssl.pkg.yml crypto.wolfssl.syscfg.yml include.am setup.shcerts
1024
ca-cert.der ca-cert.pem ca-key.der ca-key.pem client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der dh1024.der dh1024.pem dsa-pub-1024.pem dsa1024.der dsa1024.pem include.am rsa1024.der server-cert.der server-cert.pem server-key.der server-key.pemcrl
extra-crls
ca-int-cert-revoked.pem claim-root.pem crl_critical_entry.pem crlnum_57oct.pem crlnum_64oct.pem general-server-crl.pem large_crlnum.pem large_crlnum2.pemdilithium
bench_dilithium_level2_key.der bench_dilithium_level3_key.der bench_dilithium_level5_key.der include.amecc
bp256r1-key.der bp256r1-key.pem ca-secp256k1-cert.pem ca-secp256k1-key.pem client-bp256r1-cert.der client-bp256r1-cert.pem client-secp256k1-cert.der client-secp256k1-cert.pem genecc.sh include.am secp256k1-key.der secp256k1-key.pem secp256k1-param.pem secp256k1-privkey.der secp256k1-privkey.pem server-bp256r1-cert.der server-bp256r1-cert.pem server-secp256k1-cert.der server-secp256k1-cert.pem server2-secp256k1-cert.der server2-secp256k1-cert.pem wolfssl.cnf wolfssl_384.cnfed25519
ca-ed25519-key.der ca-ed25519-key.pem ca-ed25519-priv.der ca-ed25519-priv.pem ca-ed25519.der ca-ed25519.pem client-ed25519-key.der client-ed25519-key.pem client-ed25519-priv.der client-ed25519-priv.pem client-ed25519.der client-ed25519.pem eddsa-ed25519.der eddsa-ed25519.pem gen-ed25519-certs.sh gen-ed25519-keys.sh gen-ed25519.sh include.am root-ed25519-key.der root-ed25519-key.pem root-ed25519-priv.der root-ed25519-priv.pem root-ed25519.der root-ed25519.pem server-ed25519-cert.pem server-ed25519-key.der server-ed25519-key.pem server-ed25519-priv.der server-ed25519-priv.pem server-ed25519.der server-ed25519.pemed448
ca-ed448-key.der ca-ed448-key.pem ca-ed448-priv.der ca-ed448-priv.pem ca-ed448.der ca-ed448.pem client-ed448-key.der client-ed448-key.pem client-ed448-priv.der client-ed448-priv.pem client-ed448.der client-ed448.pem gen-ed448-certs.sh gen-ed448-keys.sh include.am root-ed448-key.der root-ed448-key.pem root-ed448-priv.der root-ed448-priv.pem root-ed448.der root-ed448.pem server-ed448-cert.pem server-ed448-key.der server-ed448-key.pem server-ed448-priv.der server-ed448-priv.pem server-ed448.der server-ed448.pemexternal
DigiCertGlobalRootCA.pem README.txt ca-digicert-ev.pem ca-globalsign-root.pem ca-google-root.pem ca_collection.pem include.amintermediate
ca_false_intermediate
gentestcert.sh int_ca.key server.key test_ca.key test_ca.pem test_int_not_cacert.pem test_sign_bynoca_srv.pem wolfssl_base.conf wolfssl_srv.conflms
bc_hss_L2_H5_W8_root.der bc_hss_L3_H5_W4_root.der bc_lms_chain_ca.der bc_lms_chain_leaf.der bc_lms_native_bc_root.der bc_lms_sha256_h10_w8_root.der bc_lms_sha256_h5_w4_root.der include.ammldsa
README.txt include.am mldsa44-cert.der mldsa44-cert.pem mldsa44-key.pem mldsa44_bare-priv.der mldsa44_bare-seed.der mldsa44_oqskeypair.der mldsa44_priv-only.der mldsa44_pub-spki.der mldsa44_seed-only.der mldsa44_seed-priv.der mldsa65-cert.der mldsa65-cert.pem mldsa65-key.pem mldsa65_bare-priv.der mldsa65_bare-seed.der mldsa65_oqskeypair.der mldsa65_priv-only.der mldsa65_pub-spki.der mldsa65_seed-only.der mldsa65_seed-priv.der mldsa87-cert.der mldsa87-cert.pem mldsa87-key.pem mldsa87_bare-priv.der mldsa87_bare-seed.der mldsa87_oqskeypair.der mldsa87_priv-only.der mldsa87_pub-spki.der mldsa87_seed-only.der mldsa87_seed-priv.derocsp
imposter-root-ca-cert.der imposter-root-ca-cert.pem imposter-root-ca-key.der imposter-root-ca-key.pem include.am index-ca-and-intermediate-cas.txt index-ca-and-intermediate-cas.txt.attr index-intermediate1-ca-issued-certs.txt index-intermediate1-ca-issued-certs.txt.attr index-intermediate2-ca-issued-certs.txt index-intermediate2-ca-issued-certs.txt.attr index-intermediate3-ca-issued-certs.txt index-intermediate3-ca-issued-certs.txt.attr intermediate1-ca-cert.der intermediate1-ca-cert.pem intermediate1-ca-key.der intermediate1-ca-key.pem intermediate2-ca-cert.der intermediate2-ca-cert.pem intermediate2-ca-key.der intermediate2-ca-key.pem intermediate3-ca-cert.der intermediate3-ca-cert.pem intermediate3-ca-key.der intermediate3-ca-key.pem ocsp-responder-cert.der ocsp-responder-cert.pem ocsp-responder-key.der ocsp-responder-key.pem openssl.cnf renewcerts-for-test.sh renewcerts.sh root-ca-cert.der root-ca-cert.pem root-ca-crl.pem root-ca-key.der root-ca-key.pem server1-cert.der server1-cert.pem server1-chain-noroot.pem server1-key.der server1-key.pem server2-cert.der server2-cert.pem server2-key.der server2-key.pem server3-cert.der server3-cert.pem server3-key.der server3-key.pem server4-cert.der server4-cert.pem server4-key.der server4-key.pem server5-cert.der server5-cert.pem server5-key.der server5-key.pem test-leaf-response.der test-multi-response.der test-response-nointern.der test-response-rsapss.der test-response.derp521
ca-p521-key.der ca-p521-key.pem ca-p521-priv.der ca-p521-priv.pem ca-p521.der ca-p521.pem client-p521-key.der client-p521-key.pem client-p521-priv.der client-p521-priv.pem client-p521.der client-p521.pem gen-p521-certs.sh gen-p521-keys.sh include.am root-p521-key.der root-p521-key.pem root-p521-priv.der root-p521-priv.pem root-p521.der root-p521.pem server-p521-cert.pem server-p521-key.der server-p521-key.pem server-p521-priv.der server-p521-priv.pem server-p521.der server-p521.pemrpk
client-cert-rpk.der client-ecc-cert-rpk.der include.am server-cert-rpk.der server-ecc-cert-rpk.derrsapss
ca-3072-rsapss-key.der ca-3072-rsapss-key.pem ca-3072-rsapss-priv.der ca-3072-rsapss-priv.pem ca-3072-rsapss.der ca-3072-rsapss.pem ca-rsapss-key.der ca-rsapss-key.pem ca-rsapss-priv.der ca-rsapss-priv.pem ca-rsapss.der ca-rsapss.pem client-3072-rsapss-key.der client-3072-rsapss-key.pem client-3072-rsapss-priv.der client-3072-rsapss-priv.pem client-3072-rsapss.der client-3072-rsapss.pem client-rsapss-key.der client-rsapss-key.pem client-rsapss-priv.der client-rsapss-priv.pem client-rsapss.der client-rsapss.pem gen-rsapss-keys.sh include.am renew-rsapss-certs.sh root-3072-rsapss-key.der root-3072-rsapss-key.pem root-3072-rsapss-priv.der root-3072-rsapss-priv.pem root-3072-rsapss.der root-3072-rsapss.pem root-rsapss-key.der root-rsapss-key.pem root-rsapss-priv.der root-rsapss-priv.pem root-rsapss.der root-rsapss.pem server-3072-rsapss-cert.pem server-3072-rsapss-key.der server-3072-rsapss-key.pem server-3072-rsapss-priv.der server-3072-rsapss-priv.pem server-3072-rsapss.der server-3072-rsapss.pem server-mix-rsapss-cert.pem server-rsapss-cert.pem server-rsapss-key.der server-rsapss-key.pem server-rsapss-priv.der server-rsapss-priv.pem server-rsapss.der server-rsapss.pemslhdsa
bench_slhdsa_sha2_128f_key.der bench_slhdsa_sha2_128s_key.der bench_slhdsa_sha2_192f_key.der bench_slhdsa_sha2_192s_key.der bench_slhdsa_sha2_256f_key.der bench_slhdsa_sha2_256s_key.der bench_slhdsa_shake128f_key.der bench_slhdsa_shake128s_key.der bench_slhdsa_shake192f_key.der bench_slhdsa_shake192s_key.der bench_slhdsa_shake256f_key.der bench_slhdsa_shake256s_key.der client-mldsa44-priv.pem client-mldsa44-sha2.der client-mldsa44-sha2.pem client-mldsa44-shake.der client-mldsa44-shake.pem gen-slhdsa-mldsa-certs.sh include.am root-slhdsa-sha2-128s-priv.der root-slhdsa-sha2-128s-priv.pem root-slhdsa-sha2-128s.der root-slhdsa-sha2-128s.pem root-slhdsa-shake-128s-priv.der root-slhdsa-shake-128s-priv.pem root-slhdsa-shake-128s.der root-slhdsa-shake-128s.pem server-mldsa44-priv.pem server-mldsa44-sha2.der server-mldsa44-sha2.pem server-mldsa44-shake.der server-mldsa44-shake.pemsm2
ca-sm2-key.der ca-sm2-key.pem ca-sm2-priv.der ca-sm2-priv.pem ca-sm2.der ca-sm2.pem client-sm2-key.der client-sm2-key.pem client-sm2-priv.der client-sm2-priv.pem client-sm2.der client-sm2.pem fix_sm2_spki.py gen-sm2-certs.sh gen-sm2-keys.sh include.am root-sm2-key.der root-sm2-key.pem root-sm2-priv.der root-sm2-priv.pem root-sm2.der root-sm2.pem self-sm2-cert.pem self-sm2-key.pem self-sm2-priv.pem server-sm2-cert.der server-sm2-cert.pem server-sm2-key.der server-sm2-key.pem server-sm2-priv.der server-sm2-priv.pem server-sm2.der server-sm2.pemstatickeys
dh-ffdhe2048-params.pem dh-ffdhe2048-pub.der dh-ffdhe2048-pub.pem dh-ffdhe2048.der dh-ffdhe2048.pem ecc-secp256r1.der ecc-secp256r1.pem gen-static.sh include.am x25519-pub.der x25519-pub.pem x25519.der x25519.pemtest
catalog.txt cert-bad-neg-int.der cert-bad-oid.der cert-bad-utf8.der cert-ext-ia.cfg cert-ext-ia.der cert-ext-ia.pem cert-ext-joi.cfg cert-ext-joi.der cert-ext-joi.pem cert-ext-mnc.der cert-ext-multiple.cfg cert-ext-multiple.der cert-ext-multiple.pem cert-ext-nc-combined.der cert-ext-nc-combined.pem cert-ext-nc.cfg cert-ext-nc.der cert-ext-nc.pem cert-ext-ncdns.der cert-ext-ncdns.pem cert-ext-ncip.der cert-ext-ncip.pem cert-ext-ncmixed.der cert-ext-ncmulti.der cert-ext-ncmulti.pem cert-ext-ncrid.der cert-ext-ncrid.pem cert-ext-nct.cfg cert-ext-nct.der cert-ext-nct.pem cert-ext-ndir-exc.cfg cert-ext-ndir-exc.der cert-ext-ndir-exc.pem cert-ext-ndir.cfg cert-ext-ndir.der cert-ext-ndir.pem cert-ext-ns.der cert-over-max-altnames.cfg cert-over-max-altnames.der cert-over-max-altnames.pem cert-over-max-nc.cfg cert-over-max-nc.der cert-over-max-nc.pem client-ecc-cert-ski.hex cn-ip-literal.der cn-ip-wildcard.der crit-cert.pem crit-key.pem dh1024.der dh1024.pem dh512.der dh512.pem digsigku.pem encrypteddata.msg gen-badsig.sh gen-ext-certs.sh gen-testcerts.sh include.am kari-keyid-cms.msg ktri-keyid-cms.msg ossl-trusted-cert.pem server-badaltname.der server-badaltname.pem server-badaltnull.der server-badaltnull.pem server-badcn.der server-badcn.pem server-badcnnull.der server-badcnnull.pem server-cert-ecc-badsig.der server-cert-ecc-badsig.pem server-cert-rsa-badsig.der server-cert-rsa-badsig.pem server-duplicate-policy.pem server-garbage.der server-garbage.pem server-goodalt.der server-goodalt.pem server-goodaltwild.der server-goodaltwild.pem server-goodcn.der server-goodcn.pem server-goodcnwild.der server-goodcnwild.pem server-localhost.der server-localhost.pem smime-test-canon.p7s smime-test-multipart-badsig.p7s smime-test-multipart.p7s smime-test.p7stest-pathlen
assemble-chains.sh chainA-ICA1-key.pem chainA-ICA1-pathlen0.pem chainA-assembled.pem chainA-entity-key.pem chainA-entity.pem chainB-ICA1-key.pem chainB-ICA1-pathlen0.pem chainB-ICA2-key.pem chainB-ICA2-pathlen1.pem chainB-assembled.pem chainB-entity-key.pem chainB-entity.pem chainC-ICA1-key.pem chainC-ICA1-pathlen1.pem chainC-assembled.pem chainC-entity-key.pem chainC-entity.pem chainD-ICA1-key.pem chainD-ICA1-pathlen127.pem chainD-assembled.pem chainD-entity-key.pem chainD-entity.pem chainE-ICA1-key.pem chainE-ICA1-pathlen128.pem chainE-assembled.pem chainE-entity-key.pem chainE-entity.pem chainF-ICA1-key.pem chainF-ICA1-pathlen1.pem chainF-ICA2-key.pem chainF-ICA2-pathlen0.pem chainF-assembled.pem chainF-entity-key.pem chainF-entity.pem chainG-ICA1-key.pem chainG-ICA1-pathlen0.pem chainG-ICA2-key.pem chainG-ICA2-pathlen1.pem chainG-ICA3-key.pem chainG-ICA3-pathlen99.pem chainG-ICA4-key.pem chainG-ICA4-pathlen5.pem chainG-ICA5-key.pem chainG-ICA5-pathlen20.pem chainG-ICA6-key.pem chainG-ICA6-pathlen10.pem chainG-ICA7-key.pem chainG-ICA7-pathlen100.pem chainG-assembled.pem chainG-entity-key.pem chainG-entity.pem chainH-ICA1-key.pem chainH-ICA1-pathlen0.pem chainH-ICA2-key.pem chainH-ICA2-pathlen2.pem chainH-ICA3-key.pem chainH-ICA3-pathlen2.pem chainH-ICA4-key.pem chainH-ICA4-pathlen2.pem chainH-assembled.pem chainH-entity-key.pem chainH-entity.pem chainI-ICA1-key.pem chainI-ICA1-no_pathlen.pem chainI-ICA2-key.pem chainI-ICA2-no_pathlen.pem chainI-ICA3-key.pem chainI-ICA3-pathlen2.pem chainI-assembled.pem chainI-entity-key.pem chainI-entity.pem chainJ-ICA1-key.pem chainJ-ICA1-no_pathlen.pem chainJ-ICA2-key.pem chainJ-ICA2-no_pathlen.pem chainJ-ICA3-key.pem chainJ-ICA3-no_pathlen.pem chainJ-ICA4-key.pem chainJ-ICA4-pathlen2.pem chainJ-assembled.pem chainJ-entity-key.pem chainJ-entity.pem include.am refreshkeys.shtest-serial0
ee_normal.pem ee_serial0.pem generate_certs.sh include.am intermediate_serial0.pem root_serial0.pem root_serial0_key.pem selfsigned_nonca_serial0.pemxmss
bc_xmss_chain_ca.der bc_xmss_chain_leaf.der bc_xmss_sha2_10_256_root.der bc_xmss_sha2_16_256_root.der bc_xmssmt_sha2_20_2_256_root.der bc_xmssmt_sha2_20_4_256_root.der bc_xmssmt_sha2_40_8_256_root.der include.amcmake
Config.cmake.in README.md config.in functions.cmake include.am options.h.in wolfssl-config-version.cmake.in wolfssl-targets.cmake.indebian
changelog.in control.in copyright include.am libwolfssl-dev.install libwolfssl.install rules.indoc
dox_comments
header_files
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h puf.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wc_she.h wc_slhdsa.h wolfio.hheader_files-ja
aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wolfio.hexamples
async
Makefile README.md async_client.c async_server.c async_tls.c async_tls.h include.am user_settings.hconfigs
README.md include.am user_settings_EBSnet.h user_settings_all.h user_settings_arduino.h user_settings_baremetal.h user_settings_ca.h user_settings_curve25519nonblock.h user_settings_dtls13.h user_settings_eccnonblock.h user_settings_espressif.h user_settings_fipsv2.h user_settings_fipsv5.h user_settings_min_ecc.h user_settings_openssl_compat.h user_settings_pkcs7.h user_settings_platformio.h user_settings_pq.h user_settings_rsa_only.h user_settings_stm32.h user_settings_template.h user_settings_tls12.h user_settings_tls13.h user_settings_wolfboot_keytools.h user_settings_wolfssh.h user_settings_wolftpm.hechoclient
echoclient.c echoclient.h echoclient.sln echoclient.vcproj echoclient.vcxproj include.am quitlinuxkm
Kbuild Makefile README.md get_thread_size.c include.am linuxkm-fips-hash-wrapper.sh linuxkm-fips-hash.c linuxkm_memory.c linuxkm_memory.h linuxkm_wc_port.h lkcapi_aes_glue.c lkcapi_dh_glue.c lkcapi_ecdh_glue.c lkcapi_ecdsa_glue.c lkcapi_glue.c lkcapi_rsa_glue.c lkcapi_sha_glue.c module_exports.c.template module_hooks.c pie_redirect_table.c wolfcrypt.lds x86_vector_register_glue.cm4
ax_add_am_macro.m4 ax_am_jobserver.m4 ax_am_macros.m4 ax_append_compile_flags.m4 ax_append_flag.m4 ax_append_link_flags.m4 ax_append_to_file.m4 ax_atomic.m4 ax_bsdkm.m4 ax_check_compile_flag.m4 ax_check_link_flag.m4 ax_compiler_version.m4 ax_count_cpus.m4 ax_create_generic_config.m4 ax_debug.m4 ax_file_escapes.m4 ax_harden_compiler_flags.m4 ax_linuxkm.m4 ax_print_to_file.m4 ax_pthread.m4 ax_require_defined.m4 ax_tls.m4 ax_vcs_checkout.m4 hexversion.m4 lib_socket_nsl.m4 visibility.m4mqx
wolfcrypt_benchmark
ReferencedRSESystems.xml wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfcrypt_test
ReferencedRSESystems.xml wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchwolfssl_client
ReferencedRSESystems.xml wolfssl_client_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launchscripts
aria-cmake-build-test.sh asn1_oid_sum.pl benchmark.test benchmark_compare.sh cleanup_testfiles.sh crl-gen-openssl.test crl-revoked.test dertoc.pl dtls.test dtlscid.test external.test google.test include.am makedistsmall.sh memtest.sh ocsp-responder-openssl-interop.test ocsp-stapling-with-ca-as-responder.test ocsp-stapling-with-wolfssl-responder.test ocsp-stapling.test ocsp-stapling2.test ocsp-stapling_tls13multi.test ocsp.test openssl.test openssl_srtp.test pem.test ping.test pkcallbacks.test psk.test resume.test rsapss.test sniffer-gen.sh sniffer-ipv6.pcap sniffer-static-rsa.pcap sniffer-testsuite.test sniffer-tls12-keylog.out sniffer-tls12-keylog.pcap sniffer-tls12-keylog.sslkeylog sniffer-tls13-dh-resume.pcap sniffer-tls13-dh.pcap sniffer-tls13-ecc-resume.pcap sniffer-tls13-ecc.pcap sniffer-tls13-hrr.pcap sniffer-tls13-keylog.out sniffer-tls13-keylog.pcap sniffer-tls13-keylog.sslkeylog sniffer-tls13-x25519-resume.pcap sniffer-tls13-x25519.pcap stm32l4-v4_0_1_build.sh tls13.test trusted_peer.test unit.test.in user_settings_asm.shsrc
bio.c conf.c crl.c dtls.c dtls13.c include.am internal.c keys.c ocsp.c pk.c pk_ec.c pk_rsa.c quic.c sniffer.c ssl.c ssl_api_cert.c ssl_api_crl_ocsp.c ssl_api_pk.c ssl_asn1.c ssl_bn.c ssl_certman.c ssl_crypto.c ssl_ech.c ssl_load.c ssl_misc.c ssl_p7p12.c ssl_sess.c ssl_sk.c tls.c tls13.c wolfio.c x509.c x509_str.ctests
api
api.h api_decl.h create_ocsp_test_blobs.py include.am test_aes.c test_aes.h test_arc4.c test_arc4.h test_ascon.c test_ascon.h test_ascon_kats.h test_asn.c test_asn.h test_blake2.c test_blake2.h test_camellia.c test_camellia.h test_certman.c test_certman.h test_chacha.c test_chacha.h test_chacha20_poly1305.c test_chacha20_poly1305.h test_cmac.c test_cmac.h test_curve25519.c test_curve25519.h test_curve448.c test_curve448.h test_des3.c test_des3.h test_dh.c test_dh.h test_digest.h test_dsa.c test_dsa.h test_dtls.c test_dtls.h test_ecc.c test_ecc.h test_ed25519.c test_ed25519.h test_ed448.c test_ed448.h test_evp.c test_evp.h test_evp_cipher.c test_evp_cipher.h test_evp_digest.c test_evp_digest.h test_evp_pkey.c test_evp_pkey.h test_hash.c test_hash.h test_hmac.c test_hmac.h test_md2.c test_md2.h test_md4.c test_md4.h test_md5.c test_md5.h test_mldsa.c test_mldsa.h test_mlkem.c test_mlkem.h test_ocsp.c test_ocsp.h test_ocsp_test_blobs.h test_ossl_asn1.c test_ossl_asn1.h test_ossl_bio.c test_ossl_bio.h test_ossl_bn.c test_ossl_bn.h test_ossl_cipher.c test_ossl_cipher.h test_ossl_dgst.c test_ossl_dgst.h test_ossl_dh.c test_ossl_dh.h test_ossl_dsa.c test_ossl_dsa.h test_ossl_ec.c test_ossl_ec.h test_ossl_ecx.c test_ossl_ecx.h test_ossl_mac.c test_ossl_mac.h test_ossl_obj.c test_ossl_obj.h test_ossl_p7p12.c test_ossl_p7p12.h test_ossl_pem.c test_ossl_pem.h test_ossl_rand.c test_ossl_rand.h test_ossl_rsa.c test_ossl_rsa.h test_ossl_sk.c test_ossl_sk.h test_ossl_x509.c test_ossl_x509.h test_ossl_x509_acert.c test_ossl_x509_acert.h test_ossl_x509_crypto.c test_ossl_x509_crypto.h test_ossl_x509_ext.c test_ossl_x509_ext.h test_ossl_x509_info.c test_ossl_x509_info.h test_ossl_x509_io.c test_ossl_x509_io.h test_ossl_x509_lu.c test_ossl_x509_lu.h test_ossl_x509_name.c test_ossl_x509_name.h test_ossl_x509_pk.c test_ossl_x509_pk.h test_ossl_x509_str.c test_ossl_x509_str.h test_ossl_x509_vp.c test_ossl_x509_vp.h test_pkcs12.c test_pkcs12.h test_pkcs7.c test_pkcs7.h test_poly1305.c test_poly1305.h test_random.c test_random.h test_rc2.c test_rc2.h test_ripemd.c test_ripemd.h test_rsa.c test_rsa.h test_sha.c test_sha.h test_sha256.c test_sha256.h test_sha3.c test_sha3.h test_sha512.c test_sha512.h test_she.c test_she.h test_signature.c test_signature.h test_slhdsa.c test_slhdsa.h test_sm2.c test_sm2.h test_sm3.c test_sm3.h test_sm4.c test_sm4.h test_tls.c test_tls.h test_tls13.c test_tls13.h test_tls_ext.c test_tls_ext.h test_wc_encrypt.c test_wc_encrypt.h test_wolfmath.c test_wolfmath.h test_x509.c test_x509.hwolfcrypt
benchmark
README.md benchmark-VS2022.sln benchmark-VS2022.vcxproj benchmark-VS2022.vcxproj.user benchmark.c benchmark.h benchmark.sln benchmark.vcproj benchmark.vcxproj include.amsrc
port
Espressif
esp_crt_bundle
README.md cacrt_all.pem cacrt_deprecated.pem cacrt_local.pem esp_crt_bundle.c gen_crt_bundle.py pio_install_cryptography.pyRenesas
README.md renesas_common.c renesas_fspsm_aes.c renesas_fspsm_rsa.c renesas_fspsm_sha.c renesas_fspsm_util.c renesas_rx64_hw_sha.c renesas_rx64_hw_util.c renesas_tsip_aes.c renesas_tsip_rsa.c renesas_tsip_sha.c renesas_tsip_util.carm
armv8-32-aes-asm.S armv8-32-aes-asm_c.c armv8-32-chacha-asm.S armv8-32-chacha-asm_c.c armv8-32-curve25519.S armv8-32-curve25519_c.c armv8-32-mlkem-asm.S armv8-32-mlkem-asm_c.c armv8-32-poly1305-asm.S armv8-32-poly1305-asm_c.c armv8-32-sha256-asm.S armv8-32-sha256-asm_c.c armv8-32-sha3-asm.S armv8-32-sha3-asm_c.c armv8-32-sha512-asm.S armv8-32-sha512-asm_c.c armv8-aes-asm.S armv8-aes-asm_c.c armv8-aes.c armv8-chacha-asm.S armv8-chacha-asm_c.c armv8-curve25519.S armv8-curve25519_c.c armv8-mlkem-asm.S armv8-mlkem-asm_c.c armv8-poly1305-asm.S armv8-poly1305-asm_c.c armv8-sha256-asm.S armv8-sha256-asm_c.c armv8-sha256.c armv8-sha3-asm.S armv8-sha3-asm_c.c armv8-sha512-asm.S armv8-sha512-asm_c.c armv8-sha512.c cryptoCell.c cryptoCellHash.c thumb2-aes-asm.S thumb2-aes-asm_c.c thumb2-chacha-asm.S thumb2-chacha-asm_c.c thumb2-curve25519.S thumb2-curve25519_c.c thumb2-mlkem-asm.S thumb2-mlkem-asm_c.c thumb2-poly1305-asm.S thumb2-poly1305-asm_c.c thumb2-sha256-asm.S thumb2-sha256-asm_c.c thumb2-sha3-asm.S thumb2-sha3-asm_c.c thumb2-sha512-asm.S thumb2-sha512-asm_c.ccaam
README.md caam_aes.c caam_doc.pdf caam_driver.c caam_error.c caam_integrity.c caam_qnx.c caam_sha.c wolfcaam_aes.c wolfcaam_cmac.c wolfcaam_ecdsa.c wolfcaam_fsl_nxp.c wolfcaam_hash.c wolfcaam_hmac.c wolfcaam_init.c wolfcaam_qnx.c wolfcaam_rsa.c wolfcaam_seco.c wolfcaam_x25519.cdevcrypto
README.md devcrypto_aes.c devcrypto_ecdsa.c devcrypto_hash.c devcrypto_hmac.c devcrypto_rsa.c devcrypto_x25519.c wc_devcrypto.criscv
riscv-64-aes.c riscv-64-chacha.c riscv-64-poly1305.c riscv-64-sha256.c riscv-64-sha3.c riscv-64-sha512.cwolfssl
openssl
aes.h asn1.h asn1t.h bio.h bn.h buffer.h camellia.h cmac.h cms.h compat_types.h conf.h crypto.h des.h dh.h dsa.h ec.h ec25519.h ec448.h ecdh.h ecdsa.h ed25519.h ed448.h engine.h err.h evp.h fips_rand.h hmac.h include.am kdf.h lhash.h md4.h md5.h modes.h obj_mac.h objects.h ocsp.h opensslconf.h opensslv.h ossl_typ.h pem.h pkcs12.h pkcs7.h rand.h rc4.h ripemd.h rsa.h safestack.h sha.h sha3.h srp.h ssl.h ssl23.h stack.h tls1.h txt_db.h ui.h x509.h x509_vfy.h x509v3.hwolfcrypt
port
Renesas
renesas-fspsm-crypt.h renesas-fspsm-types.h renesas-rx64-hw-crypt.h renesas-tsip-crypt.h renesas_cmn.h renesas_fspsm_internal.h renesas_sync.h renesas_tsip_internal.h renesas_tsip_types.hcaam
caam_driver.h caam_error.h caam_qnx.h wolfcaam.h wolfcaam_aes.h wolfcaam_cmac.h wolfcaam_ecdsa.h wolfcaam_fsl_nxp.h wolfcaam_hash.h wolfcaam_qnx.h wolfcaam_rsa.h wolfcaam_seco.h wolfcaam_sha.h wolfcaam_x25519.hwrapper
Ada
examples
src
aes_verify_main.adb rsa_verify_main.adb sha256_main.adb spark_sockets.adb spark_sockets.ads spark_terminal.adb spark_terminal.ads tls_client.adb tls_client.ads tls_client_main.adb tls_server.adb tls_server.ads tls_server_main.adbtests
src
aes_bindings_tests.adb aes_bindings_tests.ads rsa_verify_bindings_tests.adb rsa_verify_bindings_tests.ads sha256_bindings_tests.adb sha256_bindings_tests.ads tests.adbCSharp
wolfSSL-Example-IOCallbacks
App.config wolfSSL-Example-IOCallbacks.cs wolfSSL-Example-IOCallbacks.csprojwolfSSL-TLS-ServerThreaded
App.config wolfSSL-TLS-ServerThreaded.cs wolfSSL-TLS-ServerThreaded.csprojrust
wolfssl-wolfcrypt
src
aes.rs blake2.rs chacha20_poly1305.rs cmac.rs cmac_mac.rs curve25519.rs dh.rs dilithium.rs ecc.rs ecdsa.rs ed25519.rs ed448.rs fips.rs hkdf.rs hmac.rs hmac_mac.rs kdf.rs lib.rs lms.rs mlkem.rs mlkem_kem.rs pbkdf2_password_hash.rs prf.rs random.rs rsa.rs rsa_pkcs1v15.rs sha.rs sha_digest.rs sys.rstests
test_aes.rs test_blake2.rs test_chacha20_poly1305.rs test_cmac.rs test_cmac_mac.rs test_curve25519.rs test_dh.rs test_dilithium.rs test_ecc.rs test_ecdsa.rs test_ed25519.rs test_ed448.rs test_hkdf.rs test_hmac.rs test_hmac_mac.rs test_kdf.rs test_lms.rs test_mlkem.rs test_mlkem_kem.rs test_pbkdf2_password_hash.rs test_prf.rs test_random.rs test_rsa.rs test_rsa_pkcs1v15.rs test_sha.rs test_sha_digest.rs test_wolfcrypt.rszephyr
samples
wolfssl_benchmark
CMakeLists.txt README install_test.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.confwolfssl_test
CMakeLists.txt README install_test.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
curl/lib/http.c
raw
1/***************************************************************************
2 * _ _ ____ _
3 * Project ___| | | | _ \| |
4 * / __| | | | |_) | |
5 * | (__| |_| | _ <| |___
6 * \___|\___/|_| \_\_____|
7 *
8 * Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
9 *
10 * This software is licensed as described in the file COPYING, which
11 * you should have received as part of this distribution. The terms
12 * are also available at https://curl.se/docs/copyright.html.
13 *
14 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
15 * copies of the Software, and permit persons to whom the Software is
16 * furnished to do so, under the terms of the COPYING file.
17 *
18 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
19 * KIND, either express or implied.
20 *
21 * SPDX-License-Identifier: curl
22 *
23 ***************************************************************************/
24#include "curl_setup.h"
25#include "urldata.h"
26
27#ifndef CURL_DISABLE_HTTP
28
29#ifdef HAVE_NETINET_IN_H
30#include <netinet/in.h>
31#endif
32
33#ifdef HAVE_NETDB_H
34#include <netdb.h>
35#endif
36#ifdef HAVE_ARPA_INET_H
37#include <arpa/inet.h>
38#endif
39#ifdef HAVE_NET_IF_H
40#include <net/if.h>
41#endif
42#ifdef HAVE_SYS_IOCTL_H
43#include <sys/ioctl.h>
44#endif
45
46#ifdef HAVE_SYS_PARAM_H
47#include <sys/param.h>
48#endif
49
50#include "transfer.h"
51#include "sendf.h"
52#include "curl_trc.h"
53#include "formdata.h"
54#include "mime.h"
55#include "progress.h"
56#include "curlx/base64.h"
57#include "cookie.h"
58#include "vauth/vauth.h"
59#include "vquic/vquic.h"
60#include "http_digest.h"
61#include "http_ntlm.h"
62#include "http_negotiate.h"
63#include "http_aws_sigv4.h"
64#include "url.h"
65#include "urlapi-int.h"
66#include "curl_share.h"
67#include "hostip.h"
68#include "dynhds.h"
69#include "http.h"
70#include "headers.h"
71#include "select.h"
72#include "parsedate.h" /* for the week day and month names */
73#include "multiif.h"
74#include "strcase.h"
75#include "content_encoding.h"
76#include "http_proxy.h"
77#include "http2.h"
78#include "cfilters.h"
79#include "connect.h"
80#include "curlx/strdup.h"
81#include "altsvc.h"
82#include "hsts.h"
83#include "rtsp.h"
84#include "ws.h"
85#include "bufref.h"
86#include "curlx/strparse.h"
87
88void Curl_http_neg_init(struct Curl_easy *data, struct http_negotiation *neg)
89{
90 memset(neg, 0, sizeof(*neg));
91 neg->accept_09 = data->set.http09_allowed;
92 switch(data->set.httpwant) {
93 case CURL_HTTP_VERSION_1_0:
94 neg->wanted = neg->allowed = (CURL_HTTP_V1x);
95 neg->only_10 = TRUE;
96 break;
97 case CURL_HTTP_VERSION_1_1:
98 neg->wanted = neg->allowed = (CURL_HTTP_V1x);
99 break;
100 case CURL_HTTP_VERSION_2_0:
101 neg->wanted = neg->allowed = (CURL_HTTP_V1x | CURL_HTTP_V2x);
102 neg->h2_upgrade = TRUE;
103 break;
104 case CURL_HTTP_VERSION_2TLS:
105 neg->wanted = neg->allowed = (CURL_HTTP_V1x | CURL_HTTP_V2x);
106 break;
107 case CURL_HTTP_VERSION_2_PRIOR_KNOWLEDGE:
108 neg->wanted = neg->allowed = (CURL_HTTP_V2x);
109 data->state.http_neg.h2_prior_knowledge = TRUE;
110 break;
111 case CURL_HTTP_VERSION_3:
112 neg->wanted = (CURL_HTTP_V1x | CURL_HTTP_V2x | CURL_HTTP_V3x);
113 neg->allowed = neg->wanted;
114 break;
115 case CURL_HTTP_VERSION_3ONLY:
116 neg->wanted = neg->allowed = (CURL_HTTP_V3x);
117 break;
118 case CURL_HTTP_VERSION_NONE:
119 default:
120 neg->wanted = (CURL_HTTP_V1x | CURL_HTTP_V2x);
121 neg->allowed = (CURL_HTTP_V1x | CURL_HTTP_V2x | CURL_HTTP_V3x);
122 break;
123 }
124}
125
126CURLcode Curl_http_setup_conn(struct Curl_easy *data,
127 struct connectdata *conn)
128{
129 /* allocate the HTTP-specific struct for the Curl_easy, only to survive
130 during this request */
131 if(data->state.http_neg.wanted == CURL_HTTP_V3x) {
132 /* only HTTP/3, needs to work */
133 CURLcode result = Curl_conn_may_http3(data, conn, conn->transport_wanted);
134 if(result)
135 return result;
136 }
137 return CURLE_OK;
138}
139
140#ifndef CURL_DISABLE_PROXY
141/*
142 * checkProxyHeaders() checks the linked list of custom proxy headers
143 * if proxy headers are not available, then it will lookup into http header
144 * link list
145 *
146 * It takes a connectdata struct as input to see if this is a proxy request or
147 * not, as it then might check a different header list. Provide the header
148 * prefix without colon!
149 */
150char *Curl_checkProxyheaders(struct Curl_easy *data,
151 const struct connectdata *conn,
152 const char *thisheader,
153 const size_t thislen)
154{
155 struct curl_slist *head;
156
157 for(head = (conn->bits.proxy && data->set.sep_headers) ?
158 data->set.proxyheaders : data->set.headers;
159 head; head = head->next) {
160 if(curl_strnequal(head->data, thisheader, thislen) &&
161 Curl_headersep(head->data[thislen]))
162 return head->data;
163 }
164
165 return NULL;
166}
167#endif
168
169/* If the header has a value, this function returns TRUE and the value is in
170 'outp' with blanks trimmed off.
171*/
172static bool header_has_value(const char **headerp, struct Curl_str *outp)
173{
174 bool value = !curlx_str_cspn(headerp, outp, ";:") &&
175 (!curlx_str_single(headerp, ':') || !curlx_str_single(headerp, ';'));
176
177 if(value) {
178 curlx_str_untilnl(headerp, outp, MAX_HTTP_RESP_HEADER_SIZE);
179 curlx_str_trimblanks(outp);
180 }
181 return value;
182}
183
184static bool http_header_is_empty(const char *header)
185{
186 struct Curl_str out;
187
188 if(header_has_value(&header, &out)) {
189 return curlx_strlen(&out) == 0;
190 }
191 return TRUE; /* invalid header format, treat as empty */
192}
193
194/*
195 * Strip off leading and trailing whitespace from the value in the given HTTP
196 * header line and return a strdup-ed copy in 'valp' - returns an empty
197 * string if the header value consists entirely of whitespace.
198 *
199 * If the header is provided as "name;", ending with a semicolon, it returns a
200 * blank string.
201 */
202static CURLcode copy_custom_value(const char *header, char **valp)
203{
204 struct Curl_str out;
205
206 /* find the end of the header name */
207 if(header_has_value(&header, &out)) {
208 *valp = curlx_memdup0(curlx_str(&out), curlx_strlen(&out));
209 if(*valp)
210 return CURLE_OK;
211 return CURLE_OUT_OF_MEMORY;
212 }
213 /* bad input */
214 *valp = NULL;
215 return CURLE_BAD_FUNCTION_ARGUMENT;
216}
217
218/*
219 * Strip off leading and trailing whitespace from the value in the given HTTP
220 * header line and return a strdup-ed copy in 'valp' - returns an empty
221 * string if the header value consists entirely of whitespace.
222 *
223 * This function MUST be used after the header has already been confirmed to
224 * lead with "word:".
225 *
226 * @unittest: 1626
227 */
228char *Curl_copy_header_value(const char *header)
229{
230 struct Curl_str out;
231
232 /* find the end of the header name */
233 if(!curlx_str_until(&header, &out, MAX_HTTP_RESP_HEADER_SIZE, ':') &&
234 !curlx_str_single(&header, ':')) {
235 curlx_str_untilnl(&header, &out, MAX_HTTP_RESP_HEADER_SIZE);
236 curlx_str_trimblanks(&out);
237 return curlx_memdup0(curlx_str(&out), curlx_strlen(&out));
238 }
239 /* bad input, should never happen */
240 DEBUGASSERT(0);
241 return NULL;
242}
243
244#ifndef CURL_DISABLE_HTTP_AUTH
245
246#ifndef CURL_DISABLE_BASIC_AUTH
247/*
248 * http_output_basic() sets up an Authorization: header (or the proxy version)
249 * for HTTP Basic authentication.
250 *
251 * Returns CURLcode.
252 */
253static CURLcode http_output_basic(struct Curl_easy *data,
254 struct connectdata *conn, bool proxy)
255{
256 size_t size = 0;
257 char *authorization = NULL;
258 char **p_hd;
259 CURLcode result;
260 struct Curl_creds *creds = NULL;
261 char *out;
262
263 /* credentials are unique per transfer for HTTP, do not use the ones for the
264 connection */
265 if(proxy) {
266#ifndef CURL_DISABLE_PROXY
267 p_hd = &data->req.hd_proxy_auth;
268 creds = conn->http_proxy.creds;
269#else
270 (void)conn;
271 return CURLE_NOT_BUILT_IN;
272#endif
273 }
274 else {
275 p_hd = &data->req.hd_auth;
276 creds = data->state.creds;
277 }
278
279 if(!creds) {
280 DEBUGASSERT(0);
281 return CURLE_FAILED_INIT;
282 }
283
284 out = curl_maprintf("%s:%s", creds->user, creds->passwd);
285 if(!out)
286 return CURLE_OUT_OF_MEMORY;
287
288 result = curlx_base64_encode((uint8_t *)out, strlen(out),
289 &authorization, &size);
290 if(result)
291 goto fail;
292
293 if(!authorization) {
294 result = CURLE_REMOTE_ACCESS_DENIED;
295 goto fail;
296 }
297
298 curlx_free(*p_hd);
299 *p_hd = curl_maprintf("%sAuthorization: Basic %s\r\n",
300 proxy ? "Proxy-" : "",
301 authorization);
302 curlx_free(authorization);
303 if(!*p_hd) {
304 result = CURLE_OUT_OF_MEMORY;
305 goto fail;
306 }
307
308fail:
309 curlx_free(out);
310 return result;
311}
312
313#endif
314
315#ifndef CURL_DISABLE_BEARER_AUTH
316/*
317 * http_output_bearer() sets up an Authorization: header
318 * for HTTP Bearer authentication.
319 *
320 * Returns CURLcode.
321 */
322static CURLcode http_output_bearer(struct Curl_easy *data)
323{
324 char **userp;
325 CURLcode result = CURLE_OK;
326
327 DEBUGASSERT(Curl_creds_has_oauth_bearer(data->state.creds));
328 userp = &data->req.hd_auth;
329 curlx_free(*userp);
330 *userp = curl_maprintf("Authorization: Bearer %s\r\n",
331 Curl_creds_oauth_bearer(data->state.creds));
332
333 if(!*userp) {
334 result = CURLE_OUT_OF_MEMORY;
335 goto fail;
336 }
337
338fail:
339 return result;
340}
341
342#endif
343
344#endif
345
346/* pickoneauth() selects the most favorable authentication method from the
347 * ones available and the ones we want.
348 *
349 * return TRUE if one was picked
350 */
351static bool pickoneauth(struct auth *pick, unsigned long mask)
352{
353 bool picked;
354 /* only deal with authentication we want */
355 unsigned long avail = pick->avail & pick->want & mask;
356 picked = TRUE;
357
358 /* The order of these checks is highly relevant, as this will be the order
359 of preference in case of the existence of multiple accepted types. */
360 if(avail & CURLAUTH_NEGOTIATE)
361 pick->picked = CURLAUTH_NEGOTIATE;
362#ifndef CURL_DISABLE_BEARER_AUTH
363 else if(avail & CURLAUTH_BEARER)
364 pick->picked = CURLAUTH_BEARER;
365#endif
366#ifndef CURL_DISABLE_DIGEST_AUTH
367 else if(avail & CURLAUTH_DIGEST)
368 pick->picked = CURLAUTH_DIGEST;
369#endif
370 else if(avail & CURLAUTH_NTLM)
371 pick->picked = CURLAUTH_NTLM;
372#ifndef CURL_DISABLE_BASIC_AUTH
373 else if(avail & CURLAUTH_BASIC)
374 pick->picked = CURLAUTH_BASIC;
375#endif
376#ifndef CURL_DISABLE_AWS
377 else if(avail & CURLAUTH_AWS_SIGV4)
378 pick->picked = CURLAUTH_AWS_SIGV4;
379#endif
380 else {
381 pick->picked = CURLAUTH_PICKNONE; /* we select to use nothing */
382 picked = FALSE;
383 }
384 pick->avail = CURLAUTH_NONE; /* clear it here */
385
386 return picked;
387}
388
389/*
390 * http_perhapsrewind()
391 *
392 * The current request needs to be done again - maybe due to a follow
393 * or authentication negotiation. Check if:
394 * 1) a rewind of the data sent to the server is necessary
395 * 2) the current transfer should continue or be stopped early
396 */
397static CURLcode http_perhapsrewind(struct Curl_easy *data,
398 struct connectdata *conn)
399{
400 curl_off_t bytessent = data->req.writebytecount;
401 curl_off_t expectsend = Curl_creader_total_length(data);
402 curl_off_t upload_remain = (expectsend >= 0) ? (expectsend - bytessent) : -1;
403 bool little_upload_remains = (upload_remain >= 0 && upload_remain < 2000);
404 bool needs_rewind = Curl_creader_needs_rewind(data);
405 /* By default, we would like to abort the transfer when little or unknown
406 * amount remains. This may be overridden by authentications further
407 * below! */
408 bool abort_upload = (!data->req.upload_done && !little_upload_remains);
409 VERBOSE(const char *ongoing_auth = NULL);
410
411 /* We need a rewind before uploading client read data again. The
412 * checks below influence of the upload is to be continued
413 * or aborted early.
414 * This depends on how much remains to be sent and in what state
415 * the authentication is. Some auth schemes such as NTLM do not work
416 * for a new connection. */
417 if(needs_rewind) {
418 infof(data, "Need to rewind upload for next request");
419 Curl_creader_set_rewind(data, TRUE);
420 }
421
422 if(conn->bits.close)
423 /* If we already decided to close this connection, we cannot veto. */
424 return CURLE_OK;
425
426 if(abort_upload) {
427 /* We would like to abort the upload - but should we? */
428#ifdef USE_NTLM
429 if((data->state.authproxy.picked == CURLAUTH_NTLM) ||
430 (data->state.authhost.picked == CURLAUTH_NTLM)) {
431 VERBOSE(ongoing_auth = "NTLM");
432 if((conn->http_ntlm_state != NTLMSTATE_NONE) ||
433 (conn->proxy_ntlm_state != NTLMSTATE_NONE)) {
434 /* The NTLM-negotiation has started, keep on sending.
435 * Need to do further work on same connection */
436 abort_upload = FALSE;
437 }
438 }
439#endif
440#ifdef USE_SPNEGO
441 /* There is still data left to send */
442 if((data->state.authproxy.picked == CURLAUTH_NEGOTIATE) ||
443 (data->state.authhost.picked == CURLAUTH_NEGOTIATE)) {
444 VERBOSE(ongoing_auth = "NEGOTIATE");
445 if((conn->http_negotiate_state != GSS_AUTHNONE) ||
446 (conn->proxy_negotiate_state != GSS_AUTHNONE)) {
447 /* The NEGOTIATE-negotiation has started, keep on sending.
448 * Need to do further work on same connection */
449 abort_upload = FALSE;
450 }
451 }
452#endif
453 }
454
455 if(abort_upload) {
456 if(upload_remain >= 0)
457 infof(data, "%s%sclose instead of sending %" FMT_OFF_T " more bytes",
458 ongoing_auth ? ongoing_auth : "",
459 ongoing_auth ? " send, " : "",
460 upload_remain);
461 else
462 infof(data, "%s%sclose instead of sending unknown amount "
463 "of more bytes",
464 ongoing_auth ? ongoing_auth : "",
465 ongoing_auth ? " send, " : "");
466 /* We decided to abort the ongoing transfer */
467 streamclose(conn, "Mid-auth HTTP and much data left to send");
468 data->req.size = 0; /* do not download any more than 0 bytes */
469 data->req.http_bodyless = TRUE;
470 }
471 return CURLE_OK;
472}
473
474/**
475 * http_should_fail() determines whether an HTTP response code has gotten us
476 * into an error state or not.
477 *
478 * @retval FALSE communications should continue
479 *
480 * @retval TRUE communications should not continue
481 */
482static bool http_should_fail(struct Curl_easy *data, int httpcode)
483{
484 DEBUGASSERT(data);
485 DEBUGASSERT(data->conn);
486
487 /*
488 * If we have not been asked to fail on error,
489 * do not fail.
490 */
491 if(!data->set.http_fail_on_error)
492 return FALSE;
493
494 /*
495 * Any code < 400 is never terminal.
496 */
497 if(httpcode < 400)
498 return FALSE;
499
500 /*
501 * A 416 response to a resume request is presumably because the file is
502 * already completely downloaded and thus not actually a fail.
503 */
504 if(data->state.resume_from && data->state.httpreq == HTTPREQ_GET &&
505 httpcode == 416)
506 return FALSE;
507
508 /*
509 * Any code >= 400 that is not 401 or 407 is always
510 * a terminal error
511 */
512 if((httpcode != 401) && (httpcode != 407))
513 return TRUE;
514
515 /*
516 * All we have left to deal with is 401 and 407
517 */
518 DEBUGASSERT((httpcode == 401) || (httpcode == 407));
519
520 /*
521 * Examine the current authentication state to see if this is an error. The
522 * idea is for this function to get called after processing all the headers
523 * in a response message. If we have been to asked to authenticate
524 * a particular stage, and we have done it, we are OK. If we are already
525 * completely authenticated, it is not OK to get another 401 or 407.
526 *
527 * It is possible for authentication to go stale such that the client needs
528 * to reauthenticate. Once that info is available, use it here.
529 */
530
531 /*
532 * Either we are not authenticating, or we are supposed to be authenticating
533 * something else. This is an error.
534 */
535 if((httpcode == 401) && !data->state.creds)
536 return TRUE;
537#ifndef CURL_DISABLE_PROXY
538 if((httpcode == 407) && !data->conn->http_proxy.creds)
539 return TRUE;
540#endif
541
542 return (bool)data->state.authproblem;
543}
544
545/*
546 * Curl_http_auth_act() gets called when all HTTP headers have been received
547 * and it checks what authentication methods that are available and decides
548 * which one (if any) to use. It will set 'newurl' if an auth method was
549 * picked.
550 */
551CURLcode Curl_http_auth_act(struct Curl_easy *data)
552{
553 struct connectdata *conn = data->conn;
554 bool pickhost = FALSE;
555 bool pickproxy = FALSE;
556 CURLcode result = CURLE_OK;
557 unsigned long authmask = ~0UL;
558
559 if(!Curl_creds_has_oauth_bearer(data->state.creds))
560 authmask &= (unsigned long)~CURLAUTH_BEARER;
561
562 if(100 <= data->req.httpcode && data->req.httpcode <= 199)
563 /* this is a transient response code, ignore */
564 return CURLE_OK;
565
566 if(data->state.authproblem)
567 return data->set.http_fail_on_error ? CURLE_HTTP_RETURNED_ERROR : CURLE_OK;
568
569 if(data->state.creds &&
570 ((data->req.httpcode == 401) ||
571 (data->req.authneg && data->req.httpcode < 300))) {
572 pickhost = pickoneauth(&data->state.authhost, authmask);
573 if(!pickhost)
574 data->state.authproblem = TRUE;
575 else
576 data->info.httpauthpicked = data->state.authhost.picked;
577 if(data->state.authhost.picked == CURLAUTH_NTLM &&
578 (data->req.httpversion_sent > 11)) {
579 infof(data, "Forcing HTTP/1.1 for NTLM");
580 connclose(conn, "Force HTTP/1.1 connection");
581 data->state.http_neg.wanted = CURL_HTTP_V1x;
582 data->state.http_neg.allowed = CURL_HTTP_V1x;
583 }
584 }
585#ifndef CURL_DISABLE_PROXY
586 if(conn->http_proxy.creds &&
587 ((data->req.httpcode == 407) ||
588 (data->req.authneg && data->req.httpcode < 300))) {
589 pickproxy = pickoneauth(&data->state.authproxy,
590 authmask & ~CURLAUTH_BEARER);
591 if(!pickproxy)
592 data->state.authproblem = TRUE;
593 else
594 data->info.proxyauthpicked = data->state.authproxy.picked;
595 }
596#endif
597
598 if(pickhost || pickproxy) {
599 result = http_perhapsrewind(data, conn);
600 if(result)
601 return result;
602
603 /* In case this is GSS auth, the newurl field is already allocated so
604 we must make sure to free it before allocating a new one. As figured
605 out in bug #2284386 */
606 curlx_free(data->req.newurl);
607 /* clone URL */
608 data->req.newurl = Curl_bufref_dup(&data->state.url);
609 if(!data->req.newurl)
610 return CURLE_OUT_OF_MEMORY;
611 }
612 else if((data->req.httpcode < 300) &&
613 !data->state.authhost.done &&
614 data->req.authneg) {
615 /* no (known) authentication available,
616 authentication is not "done" yet and
617 no authentication seems to be required and
618 we did not try HEAD or GET */
619 if((data->state.httpreq != HTTPREQ_GET) &&
620 (data->state.httpreq != HTTPREQ_HEAD)) {
621 /* clone URL */
622 data->req.newurl = Curl_bufref_dup(&data->state.url);
623 if(!data->req.newurl)
624 return CURLE_OUT_OF_MEMORY;
625 data->state.authhost.done = TRUE;
626 }
627 }
628 if(http_should_fail(data, data->req.httpcode)) {
629 failf(data, "The requested URL returned error: %d",
630 data->req.httpcode);
631 result = CURLE_HTTP_RETURNED_ERROR;
632 }
633
634 return result;
635}
636
637#ifndef CURL_DISABLE_HTTP_AUTH
638/*
639 * Output the correct authentication header depending on the auth type
640 * and whether or not it is to a proxy.
641 */
642static CURLcode output_auth_headers(struct Curl_easy *data,
643 struct connectdata *conn,
644 struct auth *authstatus,
645 const char *request,
646 const char *path,
647 bool proxy)
648{
649 const char *auth = NULL;
650 CURLcode result = CURLE_OK;
651 (void)conn;
652
653#ifdef CURL_DISABLE_DIGEST_AUTH
654 (void)request;
655 (void)path;
656#endif
657#ifndef CURL_DISABLE_AWS
658 if((authstatus->picked == CURLAUTH_AWS_SIGV4) && !proxy) {
659 /* this method is never for proxy */
660 auth = "AWS_SIGV4";
661 result = Curl_output_aws_sigv4(data);
662 if(result)
663 return result;
664 }
665 else
666#endif
667#ifdef USE_SPNEGO
668 if(authstatus->picked == CURLAUTH_NEGOTIATE) {
669 auth = "Negotiate";
670 result = Curl_output_negotiate(data, conn, proxy);
671 if(result)
672 return result;
673 }
674 else
675#endif
676#ifdef USE_NTLM
677 if(authstatus->picked == CURLAUTH_NTLM) {
678 auth = "NTLM";
679 result = Curl_output_ntlm(data, proxy);
680 if(result)
681 return result;
682 }
683 else
684#endif
685#ifndef CURL_DISABLE_DIGEST_AUTH
686 if(authstatus->picked == CURLAUTH_DIGEST) {
687 auth = "Digest";
688 result = Curl_output_digest(data,
689 proxy,
690 (const unsigned char *)request,
691 (const unsigned char *)path);
692 if(result)
693 return result;
694 }
695 else
696#endif
697#ifndef CURL_DISABLE_BASIC_AUTH
698 if(authstatus->picked == CURLAUTH_BASIC) {
699 /* Basic */
700 if(
701#ifndef CURL_DISABLE_PROXY
702 (proxy && conn->http_proxy.creds &&
703 !Curl_checkProxyheaders(data, conn,
704 STRCONST("Proxy-authorization"))) ||
705#endif
706 (!proxy && data->state.creds &&
707 !Curl_checkheaders(data, STRCONST("Authorization")))) {
708 auth = "Basic";
709 result = http_output_basic(data, conn, proxy);
710 if(result)
711 return result;
712 }
713
714 /* NOTE: this function should set 'done' TRUE, as the other auth
715 functions work that way */
716 authstatus->done = TRUE;
717 }
718#endif
719#ifndef CURL_DISABLE_BEARER_AUTH
720 if(authstatus->picked == CURLAUTH_BEARER) {
721 /* Bearer */
722 if(!proxy && Curl_creds_has_oauth_bearer(data->state.creds) &&
723 !Curl_checkheaders(data, STRCONST("Authorization"))) {
724 auth = "Bearer";
725 result = http_output_bearer(data);
726 if(result)
727 return result;
728 }
729
730 /* NOTE: this function should set 'done' TRUE, as the other auth
731 functions work that way */
732 authstatus->done = TRUE;
733 }
734#endif
735
736 if(auth) {
737#ifndef CURL_DISABLE_PROXY
738 if(proxy)
739 data->info.proxyauthpicked = authstatus->picked;
740 else
741 data->info.httpauthpicked = authstatus->picked;
742 infof(data, "%s auth using %s with user '%s'",
743 proxy ? "Proxy" : "Server", auth,
744 proxy ? (conn->http_proxy.creds ?
745 conn->http_proxy.creds->user : "") :
746 (data->state.creds ?
747 data->state.creds->user : ""));
748#else
749 (void)proxy;
750 infof(data, "Server auth using %s with user '%s'",
751 auth, data->state.creds ?
752 data->state.creds->user : "");
753#endif
754 authstatus->multipass = !authstatus->done;
755 }
756 else {
757 authstatus->multipass = FALSE;
758 if(proxy)
759 data->info.proxyauthpicked = 0;
760 else
761 data->info.httpauthpicked = 0;
762 }
763
764 return result;
765}
766
767CURLcode Curl_http_output_auth(struct Curl_easy *data,
768 struct connectdata *conn,
769 const char *request,
770 Curl_HttpReq httpreq,
771 const char *path,
772 const char *query,
773 bool is_connect)
774{
775 CURLcode result = CURLE_OK;
776 struct auth *authhost;
777 struct auth *authproxy;
778 const char *path_and_query = path;
779 char *tmp_str = NULL;
780
781 DEBUGASSERT(data);
782 authhost = &data->state.authhost;
783 authproxy = &data->state.authproxy;
784
785 if(
786#ifndef CURL_DISABLE_PROXY
787 (!conn->bits.httpproxy || !conn->http_proxy.creds) &&
788#endif
789#ifdef USE_SPNEGO
790 !(authhost->want & CURLAUTH_NEGOTIATE) &&
791 !(authproxy->want & CURLAUTH_NEGOTIATE) &&
792#endif
793 !data->state.creds) {
794 /* no authentication with no user or password */
795 authhost->done = TRUE;
796 authproxy->done = TRUE;
797 result = CURLE_OK;
798 goto out;
799 }
800
801 if(query) {
802 tmp_str = curl_maprintf("%s?%s", path, query);
803 if(!tmp_str) {
804 result = CURLE_OUT_OF_MEMORY;
805 goto out;
806 }
807 path_and_query = tmp_str;
808 }
809
810 if(authhost->want && !authhost->picked)
811 /* The app has selected one or more methods, but none has been picked
812 so far by a server round-trip. Then we set the picked one to the
813 want one, and if this is one single bit it will be used instantly. */
814 authhost->picked = authhost->want;
815
816 if(authproxy->want && !authproxy->picked)
817 /* The app has selected one or more methods, but none has been picked so
818 far by a proxy round-trip. Then we set the picked one to the want one,
819 and if this is one single bit it will be used instantly. */
820 authproxy->picked = authproxy->want;
821
822#ifndef CURL_DISABLE_PROXY
823 /* Send proxy authentication header if needed */
824 if(conn->bits.httpproxy && (!conn->bits.tunnel_proxy || is_connect)) {
825 result = output_auth_headers(data, conn, authproxy, request,
826 path_and_query, TRUE);
827 if(result)
828 goto out;
829 }
830 else
831#else
832 (void)is_connect;
833#endif /* CURL_DISABLE_PROXY */
834 /* we have no proxy so let's pretend we are done authenticating
835 with it */
836 authproxy->done = TRUE;
837
838 /* Either we have credentials for the origin we talk to or
839 performing authentication is allowed here */
840 if(data->state.creds || Curl_auth_allowed_to_host(data))
841 result = output_auth_headers(data, conn, authhost, request,
842 path_and_query, FALSE);
843 else
844 authhost->done = TRUE;
845
846 if(((authhost->multipass && !authhost->done) ||
847 (authproxy->multipass && !authproxy->done)) &&
848 (httpreq != HTTPREQ_GET) &&
849 (httpreq != HTTPREQ_HEAD)) {
850 /* Auth is required and we are not authenticated yet. Make a PUT or POST
851 with content-length zero as a "probe". */
852 data->req.authneg = TRUE;
853 }
854 else
855 data->req.authneg = FALSE;
856
857out:
858 curlx_free(tmp_str);
859 return result;
860}
861
862#else /* !CURL_DISABLE_HTTP_AUTH */
863/* when disabled */
864CURLcode Curl_http_output_auth(struct Curl_easy *data,
865 struct connectdata *conn,
866 const char *request,
867 Curl_HttpReq httpreq,
868 const char *path,
869 const char *query,
870 bool is_connect)
871{
872 (void)data;
873 (void)conn;
874 (void)request;
875 (void)httpreq;
876 (void)path;
877 (void)query;
878 (void)is_connect;
879 return CURLE_OK;
880}
881#endif /* !CURL_DISABLE_HTTP_AUTH, else */
882
883#if defined(USE_SPNEGO) || defined(USE_NTLM) || \
884 !defined(CURL_DISABLE_DIGEST_AUTH) || \
885 !defined(CURL_DISABLE_BASIC_AUTH) || \
886 !defined(CURL_DISABLE_BEARER_AUTH)
887static bool authcmp(const char *auth, const char *line)
888{
889 /* the auth string must not have an alnum following */
890 size_t n = strlen(auth);
891 return curl_strnequal(auth, line, n) && !ISALNUM(line[n]);
892}
893#endif
894
895#ifdef USE_SPNEGO
896static CURLcode auth_spnego(struct Curl_easy *data,
897 bool proxy,
898 const char *auth,
899 struct auth *authp,
900 uint32_t *availp)
901{
902 if((authp->avail & CURLAUTH_NEGOTIATE) || Curl_auth_is_spnego_supported()) {
903 *availp |= CURLAUTH_NEGOTIATE;
904 authp->avail |= CURLAUTH_NEGOTIATE;
905
906 if(authp->picked == CURLAUTH_NEGOTIATE) {
907 struct connectdata *conn = data->conn;
908 CURLcode result = Curl_input_negotiate(data, conn, proxy, auth);
909 curlnegotiate *negstate = proxy ? &conn->proxy_negotiate_state :
910 &conn->http_negotiate_state;
911 if(!result) {
912 curlx_free(data->req.newurl);
913 data->req.newurl = Curl_bufref_dup(&data->state.url);
914 if(!data->req.newurl)
915 return CURLE_OUT_OF_MEMORY;
916 data->state.authproblem = FALSE;
917 /* we received a GSS auth token and we dealt with it fine */
918 *negstate = GSS_AUTHRECV;
919 }
920 else
921 data->state.authproblem = TRUE;
922 }
923 }
924 return CURLE_OK;
925}
926#endif
927
928#ifdef USE_NTLM
929static CURLcode auth_ntlm(struct Curl_easy *data,
930 bool proxy,
931 const char *auth,
932 struct auth *authp,
933 uint32_t *availp)
934{
935 /* NTLM support requires the SSL crypto libs */
936 if((authp->avail & CURLAUTH_NTLM) || Curl_auth_is_ntlm_supported()) {
937 *availp |= CURLAUTH_NTLM;
938 authp->avail |= CURLAUTH_NTLM;
939
940 if(authp->picked == CURLAUTH_NTLM) {
941 /* NTLM authentication is picked and activated */
942 CURLcode result = Curl_input_ntlm(data, proxy, auth);
943 if(!result)
944 data->state.authproblem = FALSE;
945 else {
946 if(result == CURLE_OUT_OF_MEMORY)
947 return result;
948 infof(data, "NTLM authentication problem, ignoring.");
949 data->state.authproblem = TRUE;
950 }
951 }
952 }
953 return CURLE_OK;
954}
955#endif
956
957#ifndef CURL_DISABLE_DIGEST_AUTH
958static CURLcode auth_digest(struct Curl_easy *data,
959 bool proxy,
960 const char *auth,
961 struct auth *authp,
962 uint32_t *availp)
963{
964 if(authp->avail & CURLAUTH_DIGEST) {
965 *availp |= CURLAUTH_DIGEST;
966 infof(data, "Ignoring duplicate digest auth header.");
967 }
968 else if(Curl_auth_is_digest_supported()) {
969 CURLcode result;
970
971 *availp |= CURLAUTH_DIGEST;
972 authp->avail |= CURLAUTH_DIGEST;
973
974 /* We call this function on input Digest headers even if Digest
975 * authentication is not activated yet, as we need to store the
976 * incoming data from this header in case we are going to use
977 * Digest */
978 result = Curl_input_digest(data, proxy, auth);
979 if(result) {
980 if(result == CURLE_OUT_OF_MEMORY)
981 return result;
982 infof(data, "Digest authentication problem, ignoring.");
983 data->state.authproblem = TRUE;
984 }
985 }
986 return CURLE_OK;
987}
988#endif
989
990#ifndef CURL_DISABLE_BASIC_AUTH
991static CURLcode auth_basic(struct Curl_easy *data,
992 struct auth *authp,
993 uint32_t *availp)
994{
995 *availp |= CURLAUTH_BASIC;
996 authp->avail |= CURLAUTH_BASIC;
997 if(authp->picked == CURLAUTH_BASIC) {
998 /* We asked for Basic authentication but got a 40X back anyway, which
999 means our name+password is not valid. */
1000 authp->avail = CURLAUTH_NONE;
1001 infof(data, "Basic authentication problem, ignoring.");
1002 data->state.authproblem = TRUE;
1003 }
1004 return CURLE_OK;
1005}
1006#endif
1007
1008#ifndef CURL_DISABLE_BEARER_AUTH
1009static CURLcode auth_bearer(struct Curl_easy *data,
1010 struct auth *authp,
1011 uint32_t *availp)
1012{
1013 *availp |= CURLAUTH_BEARER;
1014 authp->avail |= CURLAUTH_BEARER;
1015 if(authp->picked == CURLAUTH_BEARER) {
1016 /* We asked for Bearer authentication but got a 40X back anyway, which
1017 means our token is not valid. */
1018 authp->avail = CURLAUTH_NONE;
1019 infof(data, "Bearer authentication problem, ignoring.");
1020 data->state.authproblem = TRUE;
1021 }
1022 return CURLE_OK;
1023}
1024#endif
1025
1026/*
1027 * Curl_http_input_auth() deals with Proxy-Authenticate: and WWW-Authenticate:
1028 * headers. They are dealt with both in the transfer.c main loop and in the
1029 * proxy CONNECT loop.
1030 *
1031 * The 'auth' line ends with a null byte without CR or LF present.
1032 */
1033CURLcode Curl_http_input_auth(struct Curl_easy *data, bool proxy,
1034 const char *auth) /* the first non-space */
1035{
1036 /*
1037 * This resource requires authentication
1038 */
1039#if defined(USE_SPNEGO) || \
1040 defined(USE_NTLM) || \
1041 !defined(CURL_DISABLE_DIGEST_AUTH) || \
1042 !defined(CURL_DISABLE_BASIC_AUTH) || \
1043 !defined(CURL_DISABLE_BEARER_AUTH)
1044
1045 uint32_t *availp;
1046 struct auth *authp;
1047 CURLcode result = CURLE_OK;
1048 DEBUGASSERT(auth);
1049 DEBUGASSERT(data);
1050
1051 if(proxy) {
1052 availp = &data->info.proxyauthavail;
1053 authp = &data->state.authproxy;
1054 }
1055 else {
1056 availp = &data->info.httpauthavail;
1057 authp = &data->state.authhost;
1058 }
1059
1060 /*
1061 * Here we check if we want the specific single authentication (using ==) and
1062 * if we do, we initiate usage of it.
1063 *
1064 * If the provided authentication is wanted as one out of several accepted
1065 * types (using &), we OR this authentication type to the authavail
1066 * variable.
1067 *
1068 * Note:
1069 *
1070 * ->picked is first set to the 'want' value (one or more bits) before the
1071 * request is sent, and then it is again set _after_ all response 401/407
1072 * headers have been received but then only to a single preferred method
1073 * (bit).
1074 */
1075
1076 while(*auth) {
1077#ifdef USE_SPNEGO
1078 if(authcmp("Negotiate", auth))
1079 result = auth_spnego(data, proxy, auth, authp, availp);
1080#endif
1081#ifdef USE_NTLM
1082 if(!result && authcmp("NTLM", auth))
1083 result = auth_ntlm(data, proxy, auth, authp, availp);
1084#endif
1085#ifndef CURL_DISABLE_DIGEST_AUTH
1086 if(!result && authcmp("Digest", auth))
1087 result = auth_digest(data, proxy, auth, authp, availp);
1088#endif
1089#ifndef CURL_DISABLE_BASIC_AUTH
1090 if(!result && authcmp("Basic", auth))
1091 result = auth_basic(data, authp, availp);
1092#endif
1093#ifndef CURL_DISABLE_BEARER_AUTH
1094 if(authcmp("Bearer", auth))
1095 result = auth_bearer(data, authp, availp);
1096#endif
1097
1098 if(result)
1099 break;
1100
1101 /* there may be multiple methods on one line, so keep reading */
1102 auth = strchr(auth, ',');
1103 if(auth) /* if we are on a comma, skip it */
1104 auth++;
1105 else
1106 break;
1107 curlx_str_passblanks(&auth);
1108 }
1109 return result;
1110#else
1111 (void)data;
1112 (void)proxy;
1113 (void)auth;
1114 /* nothing to do when disabled */
1115 return CURLE_OK;
1116#endif
1117}
1118
1119static void http_switch_to_get(struct Curl_easy *data, int code)
1120{
1121 const char *req = data->set.str[STRING_CUSTOMREQUEST];
1122
1123 if((req || data->state.httpreq != HTTPREQ_GET) &&
1124 (data->set.http_follow_mode == CURLFOLLOW_OBEYCODE)) {
1125 NOVERBOSE((void)code);
1126 infof(data, "Switch to GET because of %d response", code);
1127 data->state.http_ignorecustom = TRUE;
1128 }
1129 else if(req && (data->set.http_follow_mode != CURLFOLLOW_FIRSTONLY))
1130 infof(data, "Stick to %s instead of GET", req);
1131
1132 data->state.httpreq = HTTPREQ_GET;
1133 Curl_creader_set_rewind(data, FALSE);
1134}
1135
1136#define HTTPREQ_IS_POST(data) \
1137 ((data)->state.httpreq == HTTPREQ_POST || \
1138 (data)->state.httpreq == HTTPREQ_POST_FORM || \
1139 (data)->state.httpreq == HTTPREQ_POST_MIME)
1140
1141CURLcode Curl_http_follow(struct Curl_easy *data, const char *newurl,
1142 followtype type)
1143{
1144 bool disallowport = FALSE;
1145 bool reachedmax = FALSE;
1146 char *follow_url = NULL;
1147 CURLUcode uc;
1148 CURLcode rewind_result;
1149 bool switch_to_get = FALSE;
1150
1151 DEBUGASSERT(type != FOLLOW_NONE);
1152
1153 if(type != FOLLOW_FAKE)
1154 data->state.requests++; /* count all real follows */
1155 if(type == FOLLOW_REDIR) {
1156 if((data->set.maxredirs != -1) &&
1157 (data->state.followlocation >= data->set.maxredirs)) {
1158 reachedmax = TRUE;
1159 type = FOLLOW_FAKE; /* switch to fake to store the would-be-redirected
1160 to URL */
1161 }
1162 else {
1163 data->state.followlocation++; /* count redirect-followings, including
1164 auth reloads */
1165
1166 if(data->set.http_auto_referer) {
1167 CURLU *u;
1168 char *referer = NULL;
1169
1170 /* We are asked to automatically set the previous URL as the referer
1171 when we get the next URL. We pick the ->url field, which may or may
1172 not be 100% correct */
1173 Curl_bufref_free(&data->state.referer);
1174
1175 /* Make a copy of the URL without credentials and fragment */
1176 u = curl_url();
1177 if(!u)
1178 return CURLE_OUT_OF_MEMORY;
1179
1180 uc = curl_url_set(u, CURLUPART_URL,
1181 Curl_bufref_ptr(&data->state.url), 0);
1182 if(!uc)
1183 uc = curl_url_set(u, CURLUPART_FRAGMENT, NULL, 0);
1184 if(!uc)
1185 uc = curl_url_set(u, CURLUPART_USER, NULL, 0);
1186 if(!uc)
1187 uc = curl_url_set(u, CURLUPART_PASSWORD, NULL, 0);
1188 if(!uc)
1189 uc = curl_url_get(u, CURLUPART_URL, &referer, 0);
1190
1191 curl_url_cleanup(u);
1192
1193 if(uc || !referer)
1194 return CURLE_OUT_OF_MEMORY;
1195
1196 Curl_bufref_set(&data->state.referer, referer, 0, curl_free);
1197 }
1198 }
1199 }
1200
1201 if((type != FOLLOW_RETRY) &&
1202 (data->req.httpcode != 401) && (data->req.httpcode != 407) &&
1203 Curl_is_absolute_url(newurl, NULL, 0, FALSE)) {
1204 /* If this is not redirect due to a 401 or 407 response and an absolute
1205 URL: do not allow a custom port number */
1206 disallowport = TRUE;
1207 }
1208
1209 DEBUGASSERT(data->state.uh);
1210 uc = curl_url_set(data->state.uh, CURLUPART_URL, newurl, (unsigned int)
1211 ((type == FOLLOW_FAKE) ? CURLU_NON_SUPPORT_SCHEME :
1212 ((type == FOLLOW_REDIR) ? CURLU_URLENCODE : 0) |
1213 CURLU_ALLOW_SPACE |
1214 (data->set.path_as_is ? CURLU_PATH_AS_IS : 0)));
1215 if(uc) {
1216 if((uc == CURLUE_OUT_OF_MEMORY) || (type != FOLLOW_FAKE)) {
1217 failf(data, "The redirect target URL could not be parsed: %s",
1218 curl_url_strerror(uc));
1219 return Curl_uc_to_curlcode(uc);
1220 }
1221
1222 /* the URL could not be parsed for some reason, but since this is FAKE
1223 mode, duplicate the field as-is */
1224 follow_url = curlx_strdup(newurl);
1225 if(!follow_url)
1226 return CURLE_OUT_OF_MEMORY;
1227 }
1228 else {
1229 CURLU *u = curl_url();
1230 if(!u)
1231 return CURLE_OUT_OF_MEMORY;
1232 uc = curl_url_set(u, CURLUPART_URL,
1233 Curl_bufref_ptr(&data->state.url),
1234 CURLU_URLENCODE | CURLU_ALLOW_SPACE);
1235 if(!uc)
1236 uc = curl_url_get(data->state.uh, CURLUPART_URL, &follow_url, 0);
1237 if(uc) {
1238 curl_url_cleanup(u);
1239 return Curl_uc_to_curlcode(uc);
1240 }
1241
1242#ifndef CURL_DISABLE_DIGEST_AUTH
1243 {
1244 bool same_origin = Curl_url_same_origin(u, data->state.uh);
1245 curl_url_cleanup(u);
1246 if(!same_origin)
1247 Curl_auth_digest_cleanup(&data->state.digest);
1248 }
1249#else
1250 curl_url_cleanup(u);
1251#endif
1252 }
1253 DEBUGASSERT(follow_url);
1254
1255 if(type == FOLLOW_FAKE) {
1256 /* we are only figuring out the new URL if we would have followed locations
1257 but now we are done so we can get out! */
1258 data->info.wouldredirect = follow_url;
1259
1260 if(reachedmax) {
1261 failf(data, "Maximum (%d) redirects followed", data->set.maxredirs);
1262 return CURLE_TOO_MANY_REDIRECTS;
1263 }
1264 return CURLE_OK;
1265 }
1266
1267 if(disallowport)
1268 data->state.allow_port = FALSE;
1269
1270 Curl_bufref_set(&data->state.url, follow_url, 0, curl_free);
1271 rewind_result = Curl_req_soft_reset(&data->req, data);
1272 infof(data, "Issue another request to this URL: '%s'", follow_url);
1273 if((data->set.http_follow_mode == CURLFOLLOW_FIRSTONLY) &&
1274 data->set.str[STRING_CUSTOMREQUEST] &&
1275 !data->state.http_ignorecustom) {
1276 data->state.http_ignorecustom = TRUE;
1277 infof(data, "Drop custom request method for next request");
1278 }
1279
1280 /*
1281 * We get here when the HTTP code is 300-399 (and 401). We need to perform
1282 * differently based on exactly what return code there was.
1283 *
1284 * News from 7.10.6: we can also get here on a 401 or 407, in case we act on
1285 * an HTTP (proxy-) authentication scheme other than Basic.
1286 */
1287 switch(data->info.httpcode) {
1288 /* 401 - Act on a WWW-Authenticate, we keep on moving and do the
1289 Authorization: XXXX header in the HTTP request code snippet */
1290 /* 407 - Act on a Proxy-Authenticate, we keep on moving and do the
1291 Proxy-Authorization: XXXX header in the HTTP request code snippet */
1292 /* 300 - Multiple Choices */
1293 /* 306 - Not used */
1294 /* 307 - Temporary Redirect */
1295 default: /* for all above (and the unknown ones) */
1296 /* Some codes are explicitly mentioned since I have checked RFC2616 and
1297 * they seem to be OK to POST to.
1298 */
1299 break;
1300 case 301: /* Moved Permanently */
1301 /* (quote from RFC7231, section 6.4.2)
1302 *
1303 * Note: For historical reasons, a user agent MAY change the request
1304 * method from POST to GET for the subsequent request. If this
1305 * behavior is undesired, the 307 (Temporary Redirect) status code
1306 * can be used instead.
1307 *
1308 * ----
1309 *
1310 * Many webservers expect this, so these servers often answers to a POST
1311 * request with an error page. To be sure that libcurl gets the page that
1312 * most user agents would get, libcurl has to force GET.
1313 *
1314 * This behavior is forbidden by RFC1945 and the obsolete RFC2616, and
1315 * can be overridden with CURLOPT_POSTREDIR.
1316 */
1317 if(HTTPREQ_IS_POST(data) && !data->set.post301) {
1318 http_switch_to_get(data, 301);
1319 switch_to_get = TRUE;
1320 }
1321 break;
1322 case 302: /* Found */
1323 /* (quote from RFC7231, section 6.4.3)
1324 *
1325 * Note: For historical reasons, a user agent MAY change the request
1326 * method from POST to GET for the subsequent request. If this
1327 * behavior is undesired, the 307 (Temporary Redirect) status code
1328 * can be used instead.
1329 *
1330 * ----
1331 *
1332 * Many webservers expect this, so these servers often answers to a POST
1333 * request with an error page. To be sure that libcurl gets the page that
1334 * most user agents would get, libcurl has to force GET.
1335 *
1336 * This behavior is forbidden by RFC1945 and the obsolete RFC2616, and
1337 * can be overridden with CURLOPT_POSTREDIR.
1338 */
1339 if(HTTPREQ_IS_POST(data) && !data->set.post302) {
1340 http_switch_to_get(data, 302);
1341 switch_to_get = TRUE;
1342 }
1343 break;
1344
1345 case 303: /* See Other */
1346 /* 'See Other' location is not the resource but a substitute for the
1347 * resource. In this case we switch the method to GET/HEAD, unless the
1348 * method is POST and the user specified to keep it as POST.
1349 */
1350 if(!HTTPREQ_IS_POST(data) || !data->set.post303) {
1351 http_switch_to_get(data, 303);
1352 switch_to_get = TRUE;
1353 }
1354 break;
1355 case 304: /* Not Modified */
1356 /* 304 means we did a conditional request and it was "Not modified".
1357 * We should not get any Location: header in this response!
1358 */
1359 break;
1360 case 305: /* Use Proxy */
1361 /* (quote from RFC2616, section 10.3.6):
1362 * "The requested resource MUST be accessed through the proxy given
1363 * by the Location field. The Location field gives the URI of the
1364 * proxy. The recipient is expected to repeat this single request
1365 * via the proxy. 305 responses MUST only be generated by origin
1366 * servers."
1367 */
1368 break;
1369 }
1370
1371 /* When rewind of upload data failed and we are not switching to GET,
1372 * we need to fail the follow, as we cannot send the data again. */
1373 if(rewind_result && !switch_to_get)
1374 return rewind_result;
1375
1376 Curl_pgrsTime(data, TIMER_REDIRECT);
1377 Curl_pgrsResetTransferSizes(data);
1378
1379 return CURLE_OK;
1380}
1381
1382/*
1383 * Curl_compareheader()
1384 *
1385 * Returns TRUE if 'headerline' contains the 'header' with given 'content'
1386 * (within a comma-separated list of tokens). Pass 'header' WITH the colon.
1387 *
1388 * @unittest: 1625
1389 */
1390bool Curl_compareheader(const char *headerline, /* line to check */
1391 const char *header, /* header keyword _with_ colon */
1392 const size_t hlen, /* len of the keyword in bytes */
1393 const char *content, /* content string to find */
1394 const size_t clen) /* len of the content in bytes */
1395{
1396 /* RFC2616, section 4.2 says: "Each header field consists of a name followed
1397 * by a colon (":") and the field value. Field names are case-insensitive.
1398 * The field value MAY be preceded by any amount of LWS, though a single SP
1399 * is preferred." */
1400
1401 const char *p;
1402 struct Curl_str val;
1403 DEBUGASSERT(hlen);
1404 DEBUGASSERT(clen);
1405 DEBUGASSERT(header);
1406 DEBUGASSERT(content);
1407
1408 if(!curl_strnequal(headerline, header, hlen))
1409 return FALSE; /* does not start with header */
1410
1411 /* pass the header */
1412 p = &headerline[hlen];
1413
1414 if(curlx_str_untilnl(&p, &val, MAX_HTTP_RESP_HEADER_SIZE))
1415 return FALSE;
1416 curlx_str_trimblanks(&val);
1417
1418 /* find the content string in the rest of the line */
1419 if(curlx_strlen(&val) >= clen) {
1420 size_t len;
1421 p = curlx_str(&val);
1422 for(len = curlx_strlen(&val); len >= clen;) {
1423 struct Curl_str next;
1424 const char *o = p;
1425 /* after a match there must be a comma, space, newline or null byte */
1426 if(curl_strnequal(p, content, clen) &&
1427 ((p[clen] == ',') || ISBLANK(p[clen]) || ISNEWLINE(p[clen]) ||
1428 !p[clen]))
1429 return TRUE; /* match! */
1430 /* advance to the next comma */
1431 if(curlx_str_until(&p, &next, MAX_HTTP_RESP_HEADER_SIZE, ',') ||
1432 curlx_str_single(&p, ','))
1433 break; /* no comma, get out */
1434
1435 /* if there are more dummy commas, move over them as well */
1436 do
1437 curlx_str_passblanks(&p);
1438 while(!curlx_str_single(&p, ','));
1439 len -= (p - o);
1440 }
1441 }
1442 return FALSE; /* no match */
1443}
1444
1445struct cr_exp100_ctx {
1446 struct Curl_creader super;
1447 struct curltime start; /* time started waiting */
1448 enum expect100 state;
1449};
1450
1451/* Expect: 100-continue client reader, blocking uploads */
1452
1453static void http_exp100_continue(struct Curl_easy *data,
1454 struct Curl_creader *reader)
1455{
1456 struct cr_exp100_ctx *ctx = reader->ctx;
1457 if(ctx->state > EXP100_SEND_DATA) {
1458 ctx->state = EXP100_SEND_DATA;
1459 Curl_expire_done(data, EXPIRE_100_TIMEOUT);
1460 }
1461}
1462
1463static CURLcode cr_exp100_read(struct Curl_easy *data,
1464 struct Curl_creader *reader,
1465 char *buf, size_t blen,
1466 size_t *nread, bool *eos)
1467{
1468 struct cr_exp100_ctx *ctx = reader->ctx;
1469 timediff_t ms;
1470
1471 switch(ctx->state) {
1472 case EXP100_SENDING_REQUEST:
1473 if(!Curl_req_sendbuf_empty(data)) {
1474 /* The initial request data has not been fully sent yet. Do
1475 * not start the timer yet. */
1476 DEBUGF(infof(data, "cr_exp100_read, request not full sent yet"));
1477 *nread = 0;
1478 *eos = FALSE;
1479 return CURLE_OK;
1480 }
1481 /* We are now waiting for a reply from the server or
1482 * a timeout on our side IFF the request has been fully sent. */
1483 DEBUGF(infof(data, "cr_exp100_read, start AWAITING_CONTINUE, "
1484 "timeout %dms", data->set.expect_100_timeout));
1485 ctx->state = EXP100_AWAITING_CONTINUE;
1486 ctx->start = *Curl_pgrs_now(data);
1487 Curl_expire(data, data->set.expect_100_timeout, EXPIRE_100_TIMEOUT);
1488 *nread = 0;
1489 *eos = FALSE;
1490 return CURLE_OK;
1491 case EXP100_FAILED:
1492 DEBUGF(infof(data, "cr_exp100_read, expectation failed, error"));
1493 *nread = 0;
1494 *eos = FALSE;
1495 return CURLE_READ_ERROR;
1496 case EXP100_AWAITING_CONTINUE:
1497 ms = curlx_ptimediff_ms(Curl_pgrs_now(data), &ctx->start);
1498 if(ms < data->set.expect_100_timeout) {
1499 DEBUGF(infof(data, "cr_exp100_read, AWAITING_CONTINUE, not expired"));
1500 *nread = 0;
1501 *eos = FALSE;
1502 return CURLE_OK;
1503 }
1504 /* we have waited long enough, continue anyway */
1505 http_exp100_continue(data, reader);
1506 infof(data, "Done waiting for 100-continue");
1507 FALLTHROUGH();
1508 default:
1509 DEBUGF(infof(data, "cr_exp100_read, pass through"));
1510 return Curl_creader_read(data, reader->next, buf, blen, nread, eos);
1511 }
1512}
1513
1514static void cr_exp100_done(struct Curl_easy *data,
1515 struct Curl_creader *reader, int premature)
1516{
1517 struct cr_exp100_ctx *ctx = reader->ctx;
1518 ctx->state = premature ? EXP100_FAILED : EXP100_SEND_DATA;
1519 Curl_expire_done(data, EXPIRE_100_TIMEOUT);
1520}
1521
1522static const struct Curl_crtype cr_exp100 = {
1523 "cr-exp100",
1524 Curl_creader_def_init,
1525 cr_exp100_read,
1526 Curl_creader_def_close,
1527 Curl_creader_def_needs_rewind,
1528 Curl_creader_def_total_length,
1529 Curl_creader_def_resume_from,
1530 Curl_creader_def_cntrl,
1531 Curl_creader_def_is_paused,
1532 cr_exp100_done,
1533 sizeof(struct cr_exp100_ctx)
1534};
1535
1536static CURLcode http_exp100_add_reader(struct Curl_easy *data)
1537{
1538 struct Curl_creader *reader = NULL;
1539 CURLcode result;
1540
1541 result = Curl_creader_create(&reader, data, &cr_exp100, CURL_CR_PROTOCOL);
1542 if(!result)
1543 result = Curl_creader_add(data, reader);
1544 if(!result) {
1545 struct cr_exp100_ctx *ctx = reader->ctx;
1546 ctx->state = EXP100_SENDING_REQUEST;
1547 }
1548
1549 if(result && reader)
1550 Curl_creader_free(data, reader);
1551 return result;
1552}
1553
1554static void http_exp100_got100(struct Curl_easy *data)
1555{
1556 struct Curl_creader *r = Curl_creader_get_by_type(data, &cr_exp100);
1557 if(r)
1558 http_exp100_continue(data, r);
1559}
1560
1561static bool http_exp100_is_waiting(struct Curl_easy *data)
1562{
1563 struct Curl_creader *r = Curl_creader_get_by_type(data, &cr_exp100);
1564 if(r) {
1565 struct cr_exp100_ctx *ctx = r->ctx;
1566 return ctx->state == EXP100_AWAITING_CONTINUE;
1567 }
1568 return FALSE;
1569}
1570
1571static void http_exp100_send_anyway(struct Curl_easy *data)
1572{
1573 struct Curl_creader *r = Curl_creader_get_by_type(data, &cr_exp100);
1574 if(r)
1575 http_exp100_continue(data, r);
1576}
1577
1578static bool http_exp100_is_selected(struct Curl_easy *data)
1579{
1580 struct Curl_creader *r = Curl_creader_get_by_type(data, &cr_exp100);
1581 return !!r;
1582}
1583
1584/* this returns the socket to wait for in the DO and DOING state for the multi
1585 interface and then we are always _sending_ a request and thus we wait for
1586 the single socket to become writable only */
1587CURLcode Curl_http_doing_pollset(struct Curl_easy *data,
1588 struct easy_pollset *ps)
1589{
1590 /* write mode */
1591 return Curl_pollset_add_out(data, ps, data->conn->sock[FIRSTSOCKET]);
1592}
1593
1594CURLcode Curl_http_perform_pollset(struct Curl_easy *data,
1595 struct easy_pollset *ps)
1596{
1597 struct connectdata *conn = data->conn;
1598 CURLcode result = CURLE_OK;
1599
1600 if(CURL_REQ_WANT_RECV(data)) {
1601 result = Curl_pollset_add_in(data, ps, conn->sock[FIRSTSOCKET]);
1602 }
1603
1604 /* on a "Expect: 100-continue" timed wait, do not poll for outgoing */
1605 if(!result && Curl_req_want_send(data) && !http_exp100_is_waiting(data)) {
1606 result = Curl_pollset_add_out(data, ps, conn->sock[FIRSTSOCKET]);
1607 }
1608 return result;
1609}
1610
1611static CURLcode http_write_header(struct Curl_easy *data,
1612 const char *hd, size_t hdlen)
1613{
1614 CURLcode result;
1615 int writetype;
1616
1617 /* now, only output this if the header AND body are requested:
1618 */
1619 Curl_debug(data, CURLINFO_HEADER_IN, hd, hdlen);
1620
1621 writetype = CLIENTWRITE_HEADER |
1622 ((data->req.httpcode / 100 == 1) ? CLIENTWRITE_1XX : 0);
1623
1624 result = Curl_client_write(data, writetype, hd, hdlen);
1625 if(result)
1626 return result;
1627
1628 result = Curl_bump_headersize(data, hdlen, FALSE);
1629 if(result)
1630 return result;
1631
1632 data->req.deductheadercount = (100 <= data->req.httpcode &&
1633 199 >= data->req.httpcode) ?
1634 data->req.headerbytecount : 0;
1635 return result;
1636}
1637
1638/*
1639 * Curl_http_done() gets called after a single HTTP request has been
1640 * performed.
1641 */
1642
1643CURLcode Curl_http_done(struct Curl_easy *data,
1644 CURLcode status, bool premature)
1645{
1646 struct connectdata *conn = data->conn;
1647
1648 /* Clear multipass flag. If authentication is not done yet, then it will get
1649 * a chance to be set back to true when we output the next auth header */
1650 data->state.authhost.multipass = FALSE;
1651 data->state.authproxy.multipass = FALSE;
1652
1653 if(curlx_dyn_len(&data->state.headerb)) {
1654 (void)http_write_header(data, curlx_dyn_ptr(&data->state.headerb),
1655 curlx_dyn_len(&data->state.headerb));
1656 }
1657 curlx_dyn_reset(&data->state.headerb);
1658
1659 if(status)
1660 return status;
1661
1662 if(!premature && /* this check is pointless when DONE is called before the
1663 entire operation is complete */
1664 !conn->bits.retry &&
1665 !data->set.connect_only &&
1666 (data->req.bytecount +
1667 data->req.headerbytecount -
1668 data->req.deductheadercount) <= 0) {
1669 /* If this connection is not closed to be retried, AND nothing was
1670 read from the HTTP server (that counts), this cannot be right so we
1671 return an error here */
1672 failf(data, "Empty reply from server");
1673 /* Mark it as closed to avoid the "left intact" message */
1674 streamclose(conn, "Empty reply from server");
1675 return CURLE_GOT_NOTHING;
1676 }
1677
1678 return CURLE_OK;
1679}
1680
1681/* Determine if we may use HTTP 1.1 for this request. */
1682static bool http_may_use_1_1(const struct Curl_easy *data)
1683{
1684 const struct connectdata *conn = data->conn;
1685 /* We have seen a previous response for *this* transfer with 1.0,
1686 * on another connection or the same one. */
1687 if(data->state.http_neg.rcvd_min == 10)
1688 return FALSE;
1689 /* We have seen a previous response on *this* connection with 1.0. */
1690 if(conn && conn->httpversion_seen == 10)
1691 return FALSE;
1692 /* We want 1.0 and have seen no previous response on *this* connection
1693 with a higher version (maybe no response at all yet). */
1694 if((data->state.http_neg.only_10) &&
1695 (!conn || conn->httpversion_seen <= 10))
1696 return FALSE;
1697 /* We are not restricted to use 1.0 only. */
1698 return !data->state.http_neg.only_10;
1699}
1700
1701static unsigned char http_request_version(struct Curl_easy *data)
1702{
1703 unsigned char v = Curl_conn_http_version(data, data->conn);
1704 if(!v) {
1705 /* No specific HTTP connection filter installed. */
1706 v = http_may_use_1_1(data) ? 11 : 10;
1707 }
1708 return v;
1709}
1710
1711static const char *get_http_string(int httpversion)
1712{
1713 switch(httpversion) {
1714 case 30:
1715 return "3";
1716 case 20:
1717 return "2";
1718 case 11:
1719 return "1.1";
1720 default:
1721 return "1.0";
1722 }
1723}
1724
1725CURLcode Curl_add_custom_headers(struct Curl_easy *data,
1726 bool is_connect, int httpversion,
1727 struct dynbuf *req)
1728{
1729 struct curl_slist *h[2];
1730 struct curl_slist *headers;
1731 int numlists = 1; /* by default */
1732 int i;
1733
1734#ifndef CURL_DISABLE_PROXY
1735 enum Curl_proxy_use proxy;
1736
1737 if(is_connect)
1738 proxy = HEADER_CONNECT;
1739 else
1740 proxy = data->conn->bits.httpproxy && !data->conn->bits.tunnel_proxy ?
1741 HEADER_PROXY : HEADER_SERVER;
1742
1743 switch(proxy) {
1744 case HEADER_SERVER:
1745 h[0] = data->set.headers;
1746 break;
1747 case HEADER_PROXY:
1748 h[0] = data->set.headers;
1749 if(data->set.sep_headers) {
1750 h[1] = data->set.proxyheaders;
1751 numlists++;
1752 }
1753 break;
1754 case HEADER_CONNECT:
1755 if(data->set.sep_headers)
1756 h[0] = data->set.proxyheaders;
1757 else
1758 h[0] = data->set.headers;
1759 break;
1760 }
1761#else
1762 (void)is_connect;
1763 h[0] = data->set.headers;
1764#endif
1765
1766 /* loop through one or two lists */
1767 for(i = 0; i < numlists; i++) {
1768 for(headers = h[i]; headers; headers = headers->next) {
1769 CURLcode result = CURLE_OK;
1770 bool blankheader = FALSE;
1771 struct Curl_str name;
1772 const char *p = headers->data;
1773 const char *origp = p;
1774
1775 /* explicitly asked to send header without content is done by a header
1776 that ends with a semicolon, but there must be no colon present in the
1777 name */
1778 if(!curlx_str_until(&p, &name, MAX_HTTP_RESP_HEADER_SIZE, ';') &&
1779 !curlx_str_single(&p, ';') &&
1780 !curlx_str_single(&p, '\0') &&
1781 !memchr(curlx_str(&name), ':', curlx_strlen(&name)))
1782 blankheader = TRUE;
1783 else {
1784 p = origp;
1785 if(!curlx_str_until(&p, &name, MAX_HTTP_RESP_HEADER_SIZE, ':') &&
1786 !curlx_str_single(&p, ':')) {
1787 struct Curl_str val;
1788 curlx_str_untilnl(&p, &val, MAX_HTTP_RESP_HEADER_SIZE);
1789 curlx_str_trimblanks(&val);
1790 if(!curlx_strlen(&val))
1791 /* no content, do not send this */
1792 continue;
1793 }
1794 else
1795 /* no colon */
1796 continue;
1797 }
1798
1799 /* only send this if the contents was non-blank or done special */
1800
1801 if(data->state.aptr.host &&
1802 /* a Host: header was sent already, do not pass on any custom
1803 Host: header as that will produce *two* in the same
1804 request! */
1805 curlx_str_casecompare(&name, "Host"))
1806 ;
1807 else if(data->state.httpreq == HTTPREQ_POST_FORM &&
1808 /* this header (extended by formdata.c) is sent later */
1809 curlx_str_casecompare(&name, "Content-Type"))
1810 ;
1811 else if(data->state.httpreq == HTTPREQ_POST_MIME &&
1812 /* this header is sent later */
1813 curlx_str_casecompare(&name, "Content-Type"))
1814 ;
1815 else if(data->req.authneg &&
1816 /* while doing auth neg, do not allow the custom length since
1817 we will force length zero then */
1818 curlx_str_casecompare(&name, "Content-Length"))
1819 ;
1820 else if(curlx_str_casecompare(&name, "Connection"))
1821 /* Connection headers are handled specially */
1822 ;
1823 else if((httpversion >= 20) &&
1824 curlx_str_casecompare(&name, "Transfer-Encoding"))
1825 /* HTTP/2 does not support chunked requests */
1826 ;
1827 else if((curlx_str_casecompare(&name, "Authorization") ||
1828 curlx_str_casecompare(&name, "Cookie")) &&
1829 /* be careful of sending this potentially sensitive header to
1830 other hosts */
1831 !Curl_auth_allowed_to_host(data))
1832 ;
1833 else if(blankheader)
1834 result = curlx_dyn_addf(req, "%.*s:\r\n", (int)curlx_strlen(&name),
1835 curlx_str(&name));
1836 else
1837 result = curlx_dyn_addf(req, "%s\r\n", origp);
1838
1839 if(result)
1840 return result;
1841 }
1842 }
1843
1844 return CURLE_OK;
1845}
1846
1847#ifndef CURL_DISABLE_PARSEDATE
1848CURLcode Curl_add_timecondition(struct Curl_easy *data,
1849 struct dynbuf *req)
1850{
1851 const struct tm *tm;
1852 struct tm keeptime;
1853 CURLcode result;
1854 char datestr[80];
1855 const char *condp;
1856 size_t len;
1857
1858 if(data->set.timecondition == CURL_TIMECOND_NONE)
1859 /* no condition was asked for */
1860 return CURLE_OK;
1861
1862 result = curlx_gmtime(data->set.timevalue, &keeptime);
1863 if(result) {
1864 failf(data, "Invalid TIMEVALUE");
1865 return result;
1866 }
1867 tm = &keeptime;
1868
1869 switch(data->set.timecondition) {
1870 default:
1871 DEBUGF(infof(data, "invalid time condition"));
1872 return CURLE_BAD_FUNCTION_ARGUMENT;
1873
1874 case CURL_TIMECOND_IFMODSINCE:
1875 condp = "If-Modified-Since";
1876 len = 17;
1877 break;
1878 case CURL_TIMECOND_IFUNMODSINCE:
1879 condp = "If-Unmodified-Since";
1880 len = 19;
1881 break;
1882 case CURL_TIMECOND_LASTMOD:
1883 condp = "Last-Modified";
1884 len = 13;
1885 break;
1886 }
1887
1888 if(Curl_checkheaders(data, condp, len)) {
1889 /* A custom header was specified; it will be sent instead. */
1890 return CURLE_OK;
1891 }
1892
1893 /* The If-Modified-Since header family should have their times set in
1894 * GMT as RFC2616 defines: "All HTTP date/time stamps MUST be
1895 * represented in Greenwich Mean Time (GMT), without exception. For the
1896 * purposes of HTTP, GMT is exactly equal to UTC (Coordinated Universal
1897 * Time)." (see page 20 of RFC2616).
1898 */
1899
1900 /* format: "Tue, 15 Nov 1994 12:45:26 GMT" */
1901 curl_msnprintf(datestr, sizeof(datestr),
1902 "%s: %s, %02d %s %4d %02d:%02d:%02d GMT\r\n",
1903 condp,
1904 Curl_wkday[tm->tm_wday ? tm->tm_wday - 1 : 6],
1905 tm->tm_mday,
1906 Curl_month[tm->tm_mon],
1907 tm->tm_year + 1900,
1908 tm->tm_hour,
1909 tm->tm_min,
1910 tm->tm_sec);
1911
1912 result = curlx_dyn_add(req, datestr);
1913 return result;
1914}
1915#else
1916/* disabled */
1917CURLcode Curl_add_timecondition(struct Curl_easy *data,
1918 struct dynbuf *req)
1919{
1920 (void)data;
1921 (void)req;
1922 return CURLE_OK;
1923}
1924#endif
1925
1926void Curl_http_method(struct Curl_easy *data,
1927 const char **method, Curl_HttpReq *reqp)
1928{
1929 Curl_HttpReq httpreq = (Curl_HttpReq)data->state.httpreq;
1930 const char *request;
1931#ifndef CURL_DISABLE_WEBSOCKETS
1932 if(data->conn->scheme->protocol & (CURLPROTO_WS | CURLPROTO_WSS))
1933 httpreq = HTTPREQ_GET;
1934 else
1935#endif
1936 if((data->conn->scheme->protocol & (PROTO_FAMILY_HTTP | CURLPROTO_FTP)) &&
1937 data->state.upload)
1938 httpreq = HTTPREQ_PUT;
1939
1940 /* Now set the 'request' pointer to the proper request string */
1941 if(data->set.str[STRING_CUSTOMREQUEST] &&
1942 !data->state.http_ignorecustom) {
1943 request = data->set.str[STRING_CUSTOMREQUEST];
1944 }
1945 else {
1946 if(data->req.no_body)
1947 request = "HEAD";
1948 else {
1949 DEBUGASSERT((httpreq >= HTTPREQ_GET) && (httpreq <= HTTPREQ_HEAD));
1950 switch(httpreq) {
1951 case HTTPREQ_POST:
1952 case HTTPREQ_POST_FORM:
1953 case HTTPREQ_POST_MIME:
1954 request = "POST";
1955 break;
1956 case HTTPREQ_PUT:
1957 request = "PUT";
1958 break;
1959 default: /* this should never happen */
1960 case HTTPREQ_GET:
1961 request = "GET";
1962 break;
1963 case HTTPREQ_HEAD:
1964 request = "HEAD";
1965 break;
1966 }
1967 }
1968 }
1969 *method = request;
1970 *reqp = httpreq;
1971}
1972
1973static CURLcode http_useragent(struct Curl_easy *data)
1974{
1975 /* The User-Agent string might have been allocated already, because
1976 it might have been used in the proxy connect, but if we have got a header
1977 with the user-agent string specified, we erase the previously made string
1978 here. */
1979 if(Curl_checkheaders(data, STRCONST("User-Agent"))) {
1980 curlx_free(data->state.aptr.uagent);
1981 data->state.aptr.uagent = NULL;
1982 }
1983 return CURLE_OK;
1984}
1985
1986static CURLcode http_set_aptr_host(struct Curl_easy *data)
1987{
1988 struct connectdata *conn = data->conn;
1989 struct dynamically_allocated_data *aptr = &data->state.aptr;
1990 const char *ptr;
1991
1992 curlx_safefree(aptr->host);
1993#ifndef CURL_DISABLE_COOKIES
1994 curlx_safefree(data->req.cookiehost);
1995#endif
1996
1997 ptr = Curl_checkheaders(data, STRCONST("Host"));
1998 if(ptr && (!data->state.this_is_a_follow ||
1999 Curl_peer_equal(data->state.initial_origin, conn->origin))) {
2000#ifndef CURL_DISABLE_COOKIES
2001 /* If we have a given custom Host: header, we extract the hostname in
2002 order to possibly use it for cookie reasons later on. We only allow the
2003 custom Host: header if this is NOT a redirect, as setting Host: in the
2004 redirected request is being out on thin ice. Except if the hostname
2005 is the same as the first one! */
2006 char *cookiehost;
2007 CURLcode result = copy_custom_value(ptr, &cookiehost);
2008 if(result)
2009 return result;
2010 if(!*cookiehost)
2011 /* ignore empty data */
2012 curlx_free(cookiehost);
2013 else {
2014 /* If the host begins with '[', we start searching for the port after
2015 the bracket has been closed */
2016 if(*cookiehost == '[') {
2017 char *closingbracket;
2018 /* since the 'cookiehost' is an allocated memory area that will be
2019 freed later we cannot increment the pointer */
2020 memmove(cookiehost, cookiehost + 1, strlen(cookiehost) - 1);
2021 closingbracket = strchr(cookiehost, ']');
2022 if(closingbracket)
2023 *closingbracket = 0;
2024 }
2025 else {
2026 int startsearch = 0;
2027 char *colon = strchr(cookiehost + startsearch, ':');
2028 if(colon)
2029 *colon = 0; /* The host must not include an embedded port number */
2030 }
2031 data->req.cookiehost = cookiehost;
2032 }
2033#endif
2034
2035 if(!curl_strequal("Host:", ptr)) {
2036 aptr->host = curl_maprintf("Host:%s\r\n", &ptr[5]);
2037 if(!aptr->host)
2038 return CURLE_OUT_OF_MEMORY;
2039 }
2040 }
2041 else {
2042 /* Use the hostname as present in the URL if it was IPv6. */
2043 char *host = (conn->origin->user_hostname[0] == '[') ?
2044 conn->origin->user_hostname : conn->origin->hostname;
2045
2046 if(((conn->given->protocol & (CURLPROTO_HTTPS | CURLPROTO_WSS)) &&
2047 (conn->origin->port == PORT_HTTPS)) ||
2048 ((conn->given->protocol & (CURLPROTO_HTTP | CURLPROTO_WS)) &&
2049 (conn->origin->port == PORT_HTTP)))
2050 /* if(HTTPS on port 443) OR (HTTP on port 80) then do not include
2051 the port number in the host string */
2052 aptr->host = curl_maprintf("Host: %s\r\n", host);
2053 else
2054 aptr->host = curl_maprintf("Host: %s:%d\r\n", host, conn->origin->port);
2055
2056 if(!aptr->host)
2057 /* without Host: we cannot make a nice request */
2058 return CURLE_OUT_OF_MEMORY;
2059 }
2060 return CURLE_OK;
2061}
2062
2063/*
2064 * Append the request-target to the HTTP request
2065 */
2066static CURLcode http_target(struct Curl_easy *data,
2067 struct dynbuf *r)
2068{
2069 CURLcode result = CURLE_OK;
2070 const char *path = data->state.up.path;
2071 const char *query = data->state.up.query;
2072#ifndef CURL_DISABLE_PROXY
2073 struct connectdata *conn = data->conn;
2074#endif
2075
2076 if(data->set.str[STRING_TARGET]) {
2077 path = data->set.str[STRING_TARGET];
2078 query = NULL;
2079 }
2080
2081#ifndef CURL_DISABLE_PROXY
2082 if(conn->bits.httpproxy && !conn->bits.tunnel_proxy) {
2083 /* Using a proxy but does not tunnel through it */
2084
2085 /* The path sent to the proxy is in fact the entire URL, but if the remote
2086 host is a IDN-name, we must make sure that the request we produce only
2087 uses the encoded hostname! */
2088
2089 /* and no fragment part */
2090 CURLUcode uc;
2091 char *url;
2092 CURLU *h = curl_url_dup(data->state.uh);
2093 if(!h)
2094 return CURLE_OUT_OF_MEMORY;
2095
2096 if(conn->origin->user_hostname != conn->origin->hostname) {
2097 uc = curl_url_set(h, CURLUPART_HOST, conn->origin->hostname, 0);
2098 if(uc) {
2099 curl_url_cleanup(h);
2100 return CURLE_OUT_OF_MEMORY;
2101 }
2102 }
2103 uc = curl_url_set(h, CURLUPART_FRAGMENT, NULL, 0);
2104 if(uc) {
2105 curl_url_cleanup(h);
2106 return CURLE_OUT_OF_MEMORY;
2107 }
2108
2109 if(curl_strequal("http", data->state.up.scheme)) {
2110 /* when getting HTTP, we do not want the userinfo the URL */
2111 uc = curl_url_set(h, CURLUPART_USER, NULL, 0);
2112 if(uc) {
2113 curl_url_cleanup(h);
2114 return CURLE_OUT_OF_MEMORY;
2115 }
2116 uc = curl_url_set(h, CURLUPART_PASSWORD, NULL, 0);
2117 if(uc) {
2118 curl_url_cleanup(h);
2119 return CURLE_OUT_OF_MEMORY;
2120 }
2121 }
2122 else if(data->state.creds && (data->state.creds->source != CREDS_URL)) {
2123 /* credentials not from the URL need to be set */
2124 uc = curl_url_set(h, CURLUPART_USER,
2125 data->state.creds->user, CURLU_URLENCODE);
2126 if(!uc)
2127 uc = curl_url_set(h, CURLUPART_PASSWORD,
2128 data->state.creds->passwd, CURLU_URLENCODE);
2129 if(uc) {
2130 curl_url_cleanup(h);
2131 return Curl_uc_to_curlcode(uc);
2132 }
2133 }
2134
2135 /* Extract the URL to use in the request. */
2136 uc = curl_url_get(h, CURLUPART_URL, &url, CURLU_NO_DEFAULT_PORT);
2137 if(uc) {
2138 curl_url_cleanup(h);
2139 return CURLE_OUT_OF_MEMORY;
2140 }
2141
2142 curl_url_cleanup(h);
2143
2144 /* target or URL */
2145 result = curlx_dyn_add(r, data->set.str[STRING_TARGET] ?
2146 data->set.str[STRING_TARGET] : url);
2147 curlx_free(url);
2148 if(result)
2149 return result;
2150
2151 if(curl_strequal("ftp", data->state.up.scheme) &&
2152 data->set.proxy_transfer_mode) {
2153 /* when doing ftp, append ;type=<a|i> if not present */
2154 size_t len = strlen(path);
2155 bool type_present = FALSE;
2156 if((len >= 7) && !memcmp(&path[len - 7], ";type=", 6)) {
2157 switch(Curl_raw_toupper(path[len - 1])) {
2158 case 'A':
2159 case 'D':
2160 case 'I':
2161 type_present = TRUE;
2162 break;
2163 }
2164 }
2165 if(!type_present) {
2166 result = curlx_dyn_addf(r, ";type=%c",
2167 data->state.prefer_ascii ? 'a' : 'i');
2168 if(result)
2169 return result;
2170 }
2171 }
2172 }
2173
2174 else
2175#endif
2176 {
2177 result = curlx_dyn_add(r, path);
2178 if(result)
2179 return result;
2180 if(query)
2181 result = curlx_dyn_addf(r, "?%s", query);
2182 }
2183
2184 return result;
2185}
2186
2187#if !defined(CURL_DISABLE_MIME) || !defined(CURL_DISABLE_FORM_API)
2188static CURLcode set_post_reader(struct Curl_easy *data, Curl_HttpReq httpreq)
2189{
2190 CURLcode result;
2191
2192 switch(httpreq) {
2193#ifndef CURL_DISABLE_MIME
2194 case HTTPREQ_POST_MIME:
2195 data->state.mimepost = data->set.mimepostp;
2196 break;
2197#endif
2198#ifndef CURL_DISABLE_FORM_API
2199 case HTTPREQ_POST_FORM:
2200 /* Convert the form structure into a mime structure, then keep
2201 the conversion */
2202 if(!data->state.formp) {
2203 data->state.formp = curlx_calloc(1, sizeof(curl_mimepart));
2204 if(!data->state.formp)
2205 return CURLE_OUT_OF_MEMORY;
2206 Curl_mime_cleanpart(data->state.formp);
2207 result = Curl_getformdata(data, data->state.formp, data->set.httppost,
2208 data->state.fread_func);
2209 if(result) {
2210 curlx_safefree(data->state.formp);
2211 return result;
2212 }
2213 data->state.mimepost = data->state.formp;
2214 }
2215 break;
2216#endif
2217 default:
2218 data->state.mimepost = NULL;
2219 break;
2220 }
2221
2222 switch(httpreq) {
2223 case HTTPREQ_POST_FORM:
2224 case HTTPREQ_POST_MIME:
2225 /* This is form posting using mime data. */
2226#ifndef CURL_DISABLE_MIME
2227 if(data->state.mimepost) {
2228 const char *cthdr = Curl_checkheaders(data, STRCONST("Content-Type"));
2229
2230 /* Read and seek body only. */
2231 data->state.mimepost->flags |= MIME_BODY_ONLY;
2232
2233 /* Prepare the mime structure headers & set content type. */
2234
2235 if(cthdr)
2236 for(cthdr += 13; *cthdr == ' '; cthdr++)
2237 ;
2238 else if(data->state.mimepost->kind == MIMEKIND_MULTIPART)
2239 cthdr = "multipart/form-data";
2240
2241 curl_mime_headers(data->state.mimepost, data->set.headers, 0);
2242 result = Curl_mime_prepare_headers(data, data->state.mimepost, cthdr,
2243 NULL, MIMESTRATEGY_FORM);
2244 if(result)
2245 return result;
2246 curl_mime_headers(data->state.mimepost, NULL, 0);
2247 result = Curl_creader_set_mime(data, data->state.mimepost);
2248 if(result)
2249 return result;
2250 }
2251 else
2252#endif
2253 {
2254 result = Curl_creader_set_null(data);
2255 }
2256 data->state.infilesize = Curl_creader_total_length(data);
2257 return result;
2258
2259 default:
2260 return Curl_creader_set_null(data);
2261 }
2262 /* never reached */
2263}
2264#endif
2265
2266static CURLcode set_reader(struct Curl_easy *data, Curl_HttpReq httpreq)
2267{
2268 CURLcode result = CURLE_OK;
2269 curl_off_t postsize = data->state.infilesize;
2270
2271 DEBUGASSERT(data->conn);
2272
2273 if(data->req.authneg) {
2274 return Curl_creader_set_null(data);
2275 }
2276
2277 switch(httpreq) {
2278 case HTTPREQ_PUT: /* Let's PUT the data to the server! */
2279 return postsize ? Curl_creader_set_fread(data, postsize) :
2280 Curl_creader_set_null(data);
2281
2282#if !defined(CURL_DISABLE_MIME) || !defined(CURL_DISABLE_FORM_API)
2283 case HTTPREQ_POST_FORM:
2284 case HTTPREQ_POST_MIME:
2285 return set_post_reader(data, httpreq);
2286#endif
2287
2288 case HTTPREQ_POST:
2289 /* this is the simple POST, using x-www-form-urlencoded style */
2290 /* the size of the post body */
2291 if(!postsize) {
2292 result = Curl_creader_set_null(data);
2293 }
2294 else if(data->set.postfields) {
2295 size_t plen = curlx_sotouz_range(postsize, 0, SIZE_MAX);
2296 if(plen == SIZE_MAX)
2297 return CURLE_OUT_OF_MEMORY;
2298 else if(plen)
2299 result = Curl_creader_set_buf(data, data->set.postfields, plen);
2300 else
2301 result = Curl_creader_set_null(data);
2302 }
2303 else {
2304 /* we read the bytes from the callback. In case "chunked" encoding
2305 * is forced by the application, we disregard `postsize`. This is
2306 * a backward compatibility decision to earlier versions where
2307 * chunking disregarded this. See issue #13229. */
2308 bool chunked = FALSE;
2309 char *ptr = Curl_checkheaders(data, STRCONST("Transfer-Encoding"));
2310 if(ptr) {
2311 /* Some kind of TE is requested, check if 'chunked' is chosen */
2312 chunked = Curl_compareheader(ptr, STRCONST("Transfer-Encoding:"),
2313 STRCONST("chunked"));
2314 }
2315 result = Curl_creader_set_fread(data, chunked ? -1 : postsize);
2316 }
2317 return result;
2318
2319 default:
2320 /* HTTP GET/HEAD download, has no body, needs no Content-Length */
2321 data->state.infilesize = 0;
2322 return Curl_creader_set_null(data);
2323 }
2324 /* not reached */
2325}
2326
2327static CURLcode http_resume(struct Curl_easy *data, Curl_HttpReq httpreq)
2328{
2329 if((HTTPREQ_POST == httpreq || HTTPREQ_PUT == httpreq) &&
2330 data->state.resume_from) {
2331 /**********************************************************************
2332 * Resuming upload in HTTP means that we PUT or POST and that we have
2333 * got a resume_from value set. The resume value has already created
2334 * a Range: header that will be passed along. We need to "fast forward"
2335 * the file the given number of bytes and decrease the assume upload
2336 * file size before we continue this venture in the dark lands of HTTP.
2337 * Resuming mime/form posting at an offset > 0 has no sense and is ignored.
2338 *********************************************************************/
2339
2340 if(data->state.resume_from < 0) {
2341 /*
2342 * This is meant to get the size of the present remote-file by itself.
2343 * We do not support this now. Bail out!
2344 */
2345 data->state.resume_from = 0;
2346 }
2347
2348 if(data->state.resume_from && !data->req.authneg) {
2349 /* only act on the first request */
2350 CURLcode result;
2351 result = Curl_creader_resume_from(data, data->state.resume_from);
2352 if(result) {
2353 failf(data, "Unable to resume from offset %" FMT_OFF_T,
2354 data->state.resume_from);
2355 return result;
2356 }
2357 }
2358 }
2359 return CURLE_OK;
2360}
2361
2362static CURLcode http_req_set_TE(struct Curl_easy *data,
2363 struct dynbuf *req,
2364 int httpversion)
2365{
2366 CURLcode result = CURLE_OK;
2367 const char *ptr;
2368
2369 ptr = Curl_checkheaders(data, STRCONST("Transfer-Encoding"));
2370 if(ptr) {
2371 /* Some kind of TE is requested, check if 'chunked' is chosen */
2372 data->req.upload_chunky =
2373 Curl_compareheader(ptr,
2374 STRCONST("Transfer-Encoding:"), STRCONST("chunked"));
2375 if(data->req.upload_chunky && (httpversion >= 20)) {
2376 infof(data, "suppressing chunked transfer encoding on connection "
2377 "using HTTP version 2 or higher");
2378 data->req.upload_chunky = FALSE;
2379 }
2380 }
2381 else {
2382 curl_off_t req_clen = Curl_creader_total_length(data);
2383
2384 if(req_clen < 0) {
2385 /* indeterminate request content length */
2386 if(httpversion > 10) {
2387 /* On HTTP/1.1, enable chunked, on HTTP/2 and later we do not
2388 * need it */
2389 data->req.upload_chunky = (httpversion < 20);
2390 }
2391 else {
2392 failf(data, "Chunky upload is not supported by HTTP 1.0");
2393 return CURLE_UPLOAD_FAILED;
2394 }
2395 }
2396 else {
2397 /* else, no chunky upload */
2398 data->req.upload_chunky = FALSE;
2399 }
2400
2401 if(data->req.upload_chunky)
2402 result = curlx_dyn_add(req, "Transfer-Encoding: chunked\r\n");
2403 }
2404 return result;
2405}
2406
2407static CURLcode addexpect(struct Curl_easy *data, struct dynbuf *r,
2408 int httpversion, bool *announced_exp100)
2409{
2410 CURLcode result;
2411 char *ptr;
2412
2413 *announced_exp100 = FALSE;
2414 /* Avoid Expect: 100-continue if Upgrade: is used */
2415 if(data->req.upgr101 != UPGR101_NONE)
2416 return CURLE_OK;
2417
2418 /* For really small puts we do not use Expect: headers at all, and for
2419 the somewhat bigger ones we allow the app to disable it. Make
2420 sure that the expect100header is always set to the preferred value
2421 here. */
2422 ptr = Curl_checkheaders(data, STRCONST("Expect"));
2423 if(ptr) {
2424 *announced_exp100 =
2425 Curl_compareheader(ptr, STRCONST("Expect:"), STRCONST("100-continue"));
2426 }
2427 else if(!data->state.disableexpect && (httpversion == 11)) {
2428 /* if not doing HTTP 1.0 or version 2, or disabled explicitly, we add an
2429 Expect: 100-continue to the headers which actually speeds up post
2430 operations (as there is one packet coming back from the web server) */
2431 curl_off_t client_len = Curl_creader_client_length(data);
2432 if(client_len > EXPECT_100_THRESHOLD || client_len < 0) {
2433 result = curlx_dyn_addn(r, STRCONST("Expect: 100-continue\r\n"));
2434 if(result)
2435 return result;
2436 *announced_exp100 = TRUE;
2437 }
2438 }
2439 return CURLE_OK;
2440}
2441
2442static CURLcode http_add_content_hds(struct Curl_easy *data,
2443 struct dynbuf *r,
2444 int httpversion,
2445 Curl_HttpReq httpreq)
2446{
2447 CURLcode result = CURLE_OK;
2448 curl_off_t req_clen;
2449 bool announced_exp100 = FALSE;
2450
2451 DEBUGASSERT(data->conn);
2452 if(data->req.upload_chunky) {
2453 result = Curl_httpchunk_add_reader(data);
2454 if(result)
2455 return result;
2456 }
2457
2458 /* Get the request body length that has been set up */
2459 req_clen = Curl_creader_total_length(data);
2460 switch(httpreq) {
2461 case HTTPREQ_PUT:
2462 case HTTPREQ_POST:
2463#if !defined(CURL_DISABLE_MIME) || !defined(CURL_DISABLE_FORM_API)
2464 case HTTPREQ_POST_FORM:
2465 case HTTPREQ_POST_MIME:
2466#endif
2467 /* We only set Content-Length and allow a custom Content-Length if
2468 we do not upload data chunked, as RFC2616 forbids us to set both
2469 kinds of headers (Transfer-Encoding: chunked and Content-Length).
2470 We do not override a custom "Content-Length" header, but during
2471 authentication negotiation that header is suppressed.
2472 */
2473 if(req_clen >= 0 && !data->req.upload_chunky &&
2474 (data->req.authneg ||
2475 !Curl_checkheaders(data, STRCONST("Content-Length")))) {
2476 /* we allow replacing this header if not during auth negotiation,
2477 although it is not wise to actually set your own */
2478 result = curlx_dyn_addf(r, "Content-Length: %" FMT_OFF_T "\r\n",
2479 req_clen);
2480 }
2481 if(result)
2482 goto out;
2483
2484#ifndef CURL_DISABLE_MIME
2485 /* Output mime-generated headers. */
2486 if(data->state.mimepost &&
2487 ((httpreq == HTTPREQ_POST_FORM) || (httpreq == HTTPREQ_POST_MIME))) {
2488 struct curl_slist *hdr;
2489
2490 for(hdr = data->state.mimepost->curlheaders; hdr; hdr = hdr->next) {
2491 result = curlx_dyn_addf(r, "%s\r\n", hdr->data);
2492 if(result)
2493 goto out;
2494 }
2495 }
2496#endif
2497 if(httpreq == HTTPREQ_POST) {
2498 if(!Curl_checkheaders(data, STRCONST("Content-Type"))) {
2499 result = curlx_dyn_addn(r, STRCONST("Content-Type: application/"
2500 "x-www-form-urlencoded\r\n"));
2501 if(result)
2502 goto out;
2503 }
2504 }
2505 result = addexpect(data, r, httpversion, &announced_exp100);
2506 if(result)
2507 goto out;
2508 break;
2509 default:
2510 break;
2511 }
2512
2513 Curl_pgrsSetUploadSize(data, req_clen);
2514 if(announced_exp100)
2515 result = http_exp100_add_reader(data);
2516
2517out:
2518 return result;
2519}
2520
2521#ifndef CURL_DISABLE_COOKIES
2522
2523static CURLcode http_cookies(struct Curl_easy *data,
2524 struct dynbuf *r)
2525{
2526 CURLcode result = CURLE_OK;
2527 char *addcookies = NULL;
2528 bool linecap = FALSE;
2529 if(data->set.str[STRING_COOKIE] &&
2530 !Curl_checkheaders(data, STRCONST("Cookie")))
2531 addcookies = data->set.str[STRING_COOKIE];
2532
2533 if(data->cookies || addcookies) {
2534 struct Curl_llist list;
2535 int count = 0;
2536
2537 if(data->cookies && data->state.cookie_engine) {
2538 bool okay;
2539 const char *host = data->req.cookiehost ?
2540 data->req.cookiehost : data->conn->origin->hostname;
2541 Curl_share_lock(data, CURL_LOCK_DATA_COOKIE, CURL_LOCK_ACCESS_SINGLE);
2542 result = Curl_cookie_getlist(data, data->conn, &okay, host, &list);
2543 if(!result && okay) {
2544 struct Curl_llist_node *n;
2545 size_t clen = 8; /* hold the size of the generated Cookie: header */
2546
2547 /* loop through all cookies that matched */
2548 for(n = Curl_llist_head(&list); n; n = Curl_node_next(n)) {
2549 struct Cookie *co = Curl_node_elem(n);
2550 if(co->value) {
2551 size_t add;
2552 if(!count) {
2553 result = curlx_dyn_addn(r, STRCONST("Cookie: "));
2554 if(result)
2555 break;
2556 }
2557 add = strlen(co->name) + strlen(co->value) + 1;
2558 if(clen + add >= MAX_COOKIE_HEADER_LEN) {
2559 infof(data, "Restricted outgoing cookies due to header size, "
2560 "'%s' not sent", co->name);
2561 linecap = TRUE;
2562 break;
2563 }
2564 result = curlx_dyn_addf(r, "%s%s=%s", count ? "; " : "",
2565 co->name, co->value);
2566 if(result)
2567 break;
2568 clen += add + (count ? 2 : 0);
2569 count++;
2570 }
2571 }
2572 Curl_llist_destroy(&list, NULL);
2573 }
2574 Curl_share_unlock(data, CURL_LOCK_DATA_COOKIE);
2575 }
2576 if(addcookies && !result && !linecap) {
2577 if(!count)
2578 result = curlx_dyn_addn(r, STRCONST("Cookie: "));
2579 if(!result) {
2580 result = curlx_dyn_addf(r, "%s%s", count ? "; " : "", addcookies);
2581 count++;
2582 }
2583 }
2584 if(count && !result)
2585 result = curlx_dyn_addn(r, STRCONST("\r\n"));
2586
2587 if(result)
2588 return result;
2589 }
2590 return result;
2591}
2592#else
2593#define http_cookies(a, b) CURLE_OK
2594#endif
2595
2596static CURLcode http_range(struct Curl_easy *data,
2597 Curl_HttpReq httpreq)
2598{
2599 if(data->state.use_range) {
2600 /*
2601 * A range is selected. We use different headers whether we are downloading
2602 * or uploading and we always let customized headers override our internal
2603 * ones if any such are specified.
2604 */
2605 if(((httpreq == HTTPREQ_GET) || (httpreq == HTTPREQ_HEAD)) &&
2606 !Curl_checkheaders(data, STRCONST("Range"))) {
2607 /* if a line like this was already allocated, free the previous one */
2608 curlx_free(data->state.aptr.rangeline);
2609 data->state.aptr.rangeline = curl_maprintf("Range: bytes=%s\r\n",
2610 data->state.range);
2611 if(!data->state.aptr.rangeline)
2612 return CURLE_OUT_OF_MEMORY;
2613 }
2614 else if((httpreq == HTTPREQ_POST || httpreq == HTTPREQ_PUT) &&
2615 !Curl_checkheaders(data, STRCONST("Content-Range"))) {
2616 curl_off_t req_clen = Curl_creader_total_length(data);
2617 /* if a line like this was already allocated, free the previous one */
2618 curlx_free(data->state.aptr.rangeline);
2619
2620 if(data->set.set_resume_from < 0) {
2621 /* Upload resume was asked for, but we do not know the size of the
2622 remote part so we tell the server (and act accordingly) that we
2623 upload the whole file (again) */
2624 data->state.aptr.rangeline =
2625 curl_maprintf("Content-Range: bytes 0-%" FMT_OFF_T "/"
2626 "%" FMT_OFF_T "\r\n", req_clen - 1, req_clen);
2627 }
2628 else if(data->state.resume_from) {
2629 /* This is because "resume" was selected */
2630 /* Not sure if we want to send this header during authentication
2631 * negotiation, but test1084 checks for it. In which case we have a
2632 * "null" client reader installed that gives an unexpected length. */
2633 curl_off_t total_len = data->req.authneg ?
2634 data->state.infilesize :
2635 (data->state.resume_from + req_clen);
2636 data->state.aptr.rangeline =
2637 curl_maprintf("Content-Range: bytes %s%" FMT_OFF_T "/"
2638 "%" FMT_OFF_T "\r\n",
2639 data->state.range, total_len - 1, total_len);
2640 }
2641 else {
2642 /* Range was selected and then we pass the incoming range and append
2643 total size */
2644 data->state.aptr.rangeline =
2645 curl_maprintf("Content-Range: bytes %s/%" FMT_OFF_T "\r\n",
2646 data->state.range, req_clen);
2647 }
2648 if(!data->state.aptr.rangeline)
2649 return CURLE_OUT_OF_MEMORY;
2650 }
2651 }
2652 return CURLE_OK;
2653}
2654
2655static CURLcode http_firstwrite(struct Curl_easy *data)
2656{
2657 struct connectdata *conn = data->conn;
2658 struct SingleRequest *k = &data->req;
2659
2660 if(data->req.newurl) {
2661 if(conn->bits.close) {
2662 /* Abort after the headers if "follow Location" is set
2663 and we are set to close anyway. */
2664 CURL_REQ_CLEAR_RECV(data);
2665 k->done = TRUE;
2666 return CURLE_OK;
2667 }
2668 /* We have a new URL to load, but since we want to be able to reuse this
2669 connection properly, we read the full response in "ignore more" */
2670 k->ignorebody = TRUE;
2671 infof(data, "Ignoring the response-body");
2672 }
2673 if(data->state.resume_from && !k->content_range &&
2674 (data->state.httpreq == HTTPREQ_GET) &&
2675 !k->ignorebody) {
2676
2677 if(k->size == data->state.resume_from) {
2678 /* The resume point is at the end of file, consider this fine even if it
2679 does not allow resume from here. */
2680 infof(data, "The entire document is already downloaded");
2681 streamclose(conn, "already downloaded");
2682 /* Abort download */
2683 CURL_REQ_CLEAR_RECV(data);
2684 k->done = TRUE;
2685 return CURLE_OK;
2686 }
2687
2688 /* we wanted to resume a download, although the server does not seem to
2689 * support this and we did this with a GET (if it was not a GET we did a
2690 * POST or PUT resume) */
2691 failf(data, "HTTP server does not seem to support "
2692 "byte ranges. Cannot resume.");
2693 return CURLE_RANGE_ERROR;
2694 }
2695
2696 if(data->set.timecondition && !data->state.range) {
2697 /* A time condition has been set AND no ranges have been requested. This
2698 seems to be what chapter 13.3.4 of RFC 2616 defines to be the correct
2699 action for an HTTP/1.1 client */
2700
2701 if(!Curl_meets_timecondition(data, k->timeofdoc)) {
2702 k->done = TRUE;
2703 /* We are simulating an HTTP 304 from server so we return
2704 what should have been returned from the server */
2705 data->info.httpcode = 304;
2706 infof(data, "Simulate an HTTP 304 response");
2707 /* we abort the transfer before it is completed == we ruin the
2708 reuse ability. Close the connection */
2709 streamclose(conn, "Simulated 304 handling");
2710 return CURLE_OK;
2711 }
2712 } /* we have a time condition */
2713
2714 return CURLE_OK;
2715}
2716
2717static CURLcode http_check_new_conn(struct Curl_easy *data)
2718{
2719 struct connectdata *conn = data->conn;
2720 const char *info_version = NULL;
2721 const char *alpn;
2722 CURLcode result;
2723
2724 alpn = Curl_conn_get_alpn_negotiated(data, conn);
2725 if(alpn && !strcmp("h3", alpn)) {
2726 DEBUGASSERT(Curl_conn_http_version(data, conn) == 30);
2727 info_version = "HTTP/3";
2728 }
2729 else if(alpn && !strcmp("h2", alpn)) {
2730#ifndef CURL_DISABLE_PROXY
2731 if((Curl_conn_http_version(data, conn) != 20) &&
2732 conn->bits.proxy && !conn->bits.tunnel_proxy) {
2733 result = Curl_http2_switch(data);
2734 if(result)
2735 return result;
2736 }
2737 else
2738#endif
2739 DEBUGASSERT(Curl_conn_http_version(data, conn) == 20);
2740 info_version = "HTTP/2";
2741 }
2742 else {
2743 /* Check if user wants to use HTTP/2 with clear TCP */
2744 if(Curl_http2_may_switch(data)) {
2745 DEBUGF(infof(data, "HTTP/2 over clean TCP"));
2746 result = Curl_http2_switch(data);
2747 if(result)
2748 return result;
2749 info_version = "HTTP/2";
2750 /* There is no ALPN here, but the connection is now definitely h2 */
2751 conn->httpversion_seen = 20;
2752 Curl_conn_set_multiplex(conn);
2753 }
2754 else
2755 info_version = "HTTP/1.x";
2756 }
2757
2758 if(info_version)
2759 infof(data, "using %s", info_version);
2760 return CURLE_OK;
2761}
2762
2763static CURLcode http_add_connection_hd(struct Curl_easy *data,
2764 struct dynbuf *req)
2765{
2766 struct curl_slist *head;
2767 const char *sep = "Connection: ";
2768 CURLcode result = CURLE_OK;
2769 size_t rlen = curlx_dyn_len(req);
2770 bool skip;
2771
2772 /* Add the 1st custom "Connection: " header, if there is one */
2773 for(head = data->set.headers; head; head = head->next) {
2774 if(curl_strnequal(head->data, "Connection", 10) &&
2775 Curl_headersep(head->data[10]) &&
2776 !http_header_is_empty(head->data)) {
2777 char *value;
2778 result = copy_custom_value(head->data, &value);
2779 if(result)
2780 return result;
2781 result = curlx_dyn_addf(req, "%s%s", sep, value);
2782 sep = ", ";
2783 curlx_free(value);
2784 break; /* leave, having added 1st one */
2785 }
2786 }
2787
2788 /* add our internal Connection: header values, if we have any */
2789 if(!result && data->state.http_hd_te) {
2790 result = curlx_dyn_addf(req, "%s%s", sep, "TE");
2791 sep = ", ";
2792 }
2793 if(!result && data->state.http_hd_upgrade) {
2794 result = curlx_dyn_addf(req, "%s%s", sep, "Upgrade");
2795 sep = ", ";
2796 }
2797 if(!result && data->state.http_hd_h2_settings) {
2798 result = curlx_dyn_addf(req, "%s%s", sep, "HTTP2-Settings");
2799 }
2800 if(!result && (rlen < curlx_dyn_len(req)))
2801 result = curlx_dyn_addn(req, STRCONST("\r\n"));
2802 if(result)
2803 return result;
2804
2805 /* Add all user-defined Connection: headers after the first */
2806 skip = TRUE;
2807 for(head = data->set.headers; head; head = head->next) {
2808 if(curl_strnequal(head->data, "Connection", 10) &&
2809 Curl_headersep(head->data[10]) &&
2810 !http_header_is_empty(head->data)) {
2811 if(skip) {
2812 skip = FALSE;
2813 continue;
2814 }
2815 result = curlx_dyn_addf(req, "%s\r\n", head->data);
2816 if(result)
2817 return result;
2818 }
2819 }
2820
2821 return CURLE_OK;
2822}
2823
2824/* Header identifier in order we send them by default */
2825typedef enum {
2826 H1_HD_REQUEST,
2827 H1_HD_HOST,
2828#ifndef CURL_DISABLE_PROXY
2829 H1_HD_PROXY_AUTH,
2830#endif
2831 H1_HD_AUTH,
2832 H1_HD_RANGE,
2833 H1_HD_USER_AGENT,
2834 H1_HD_ACCEPT,
2835 H1_HD_TE,
2836 H1_HD_ACCEPT_ENCODING,
2837 H1_HD_REFERER,
2838#ifndef CURL_DISABLE_PROXY
2839 H1_HD_PROXY_CONNECTION,
2840#endif
2841 H1_HD_TRANSFER_ENCODING,
2842#ifndef CURL_DISABLE_ALTSVC
2843 H1_HD_ALT_USED,
2844#endif
2845 H1_HD_UPGRADE,
2846 H1_HD_COOKIES,
2847 H1_HD_CONDITIONALS,
2848 H1_HD_CUSTOM,
2849 H1_HD_CONTENT,
2850 H1_HD_CONNECTION,
2851 H1_HD_LAST /* the last, empty header line */
2852} http_hd_t;
2853
2854static CURLcode http_add_hd(struct Curl_easy *data,
2855 struct dynbuf *req,
2856 http_hd_t id,
2857 unsigned char httpversion,
2858 const char *method,
2859 Curl_HttpReq httpreq)
2860{
2861 CURLcode result = CURLE_OK;
2862#if !defined(CURL_DISABLE_ALTSVC) || \
2863 !defined(CURL_DISABLE_PROXY) || \
2864 !defined(CURL_DISABLE_WEBSOCKETS)
2865 struct connectdata *conn = data->conn;
2866#endif
2867 switch(id) {
2868 case H1_HD_REQUEST:
2869 /* add the main request stuff */
2870 /* GET/HEAD/POST/PUT */
2871 result = curlx_dyn_addf(req, "%s ", method);
2872 if(!result)
2873 result = http_target(data, req);
2874 if(!result)
2875 result = curlx_dyn_addf(req, " HTTP/%s\r\n",
2876 get_http_string(httpversion));
2877 break;
2878
2879 case H1_HD_HOST:
2880 if(data->state.aptr.host)
2881 result = curlx_dyn_add(req, data->state.aptr.host);
2882 break;
2883
2884#ifndef CURL_DISABLE_PROXY
2885 case H1_HD_PROXY_AUTH:
2886 if(data->req.hd_proxy_auth)
2887 result = curlx_dyn_add(req, data->req.hd_proxy_auth);
2888 break;
2889#endif
2890
2891 case H1_HD_AUTH:
2892 if(data->req.hd_auth)
2893 result = curlx_dyn_add(req, data->req.hd_auth);
2894 break;
2895
2896 case H1_HD_RANGE:
2897 if(data->state.use_range && data->state.aptr.rangeline)
2898 result = curlx_dyn_add(req, data->state.aptr.rangeline);
2899 break;
2900
2901 case H1_HD_USER_AGENT:
2902 if(data->set.str[STRING_USERAGENT] && /* User-Agent: */
2903 *data->set.str[STRING_USERAGENT] &&
2904 data->state.aptr.uagent)
2905 result = curlx_dyn_add(req, data->state.aptr.uagent);
2906 break;
2907
2908 case H1_HD_ACCEPT:
2909 if(!Curl_checkheaders(data, STRCONST("Accept")))
2910 result = curlx_dyn_add(req, "Accept: */*\r\n");
2911 break;
2912
2913 case H1_HD_TE:
2914#ifdef HAVE_LIBZ
2915 if(!Curl_checkheaders(data, STRCONST("TE")) &&
2916 data->set.http_transfer_encoding) {
2917 data->state.http_hd_te = TRUE;
2918 result = curlx_dyn_add(req, "TE: gzip\r\n");
2919 }
2920#endif
2921 break;
2922
2923 case H1_HD_ACCEPT_ENCODING:
2924 curlx_safefree(data->state.aptr.accept_encoding);
2925 if(!Curl_checkheaders(data, STRCONST("Accept-Encoding")) &&
2926 data->set.str[STRING_ENCODING])
2927 result = curlx_dyn_addf(req, "Accept-Encoding: %s\r\n",
2928 data->set.str[STRING_ENCODING]);
2929 break;
2930
2931 case H1_HD_REFERER:
2932 curlx_safefree(data->state.aptr.ref);
2933 if(Curl_bufref_ptr(&data->state.referer) &&
2934 !Curl_checkheaders(data, STRCONST("Referer")))
2935 result = curlx_dyn_addf(req, "Referer: %s\r\n",
2936 Curl_bufref_ptr(&data->state.referer));
2937 break;
2938
2939#ifndef CURL_DISABLE_PROXY
2940 case H1_HD_PROXY_CONNECTION:
2941 if(conn->bits.httpproxy &&
2942 !conn->bits.tunnel_proxy &&
2943 !Curl_checkheaders(data, STRCONST("Proxy-Connection")) &&
2944 !Curl_checkProxyheaders(data, data->conn, STRCONST("Proxy-Connection")))
2945 result = curlx_dyn_add(req, "Proxy-Connection: Keep-Alive\r\n");
2946 break;
2947#endif
2948
2949 case H1_HD_TRANSFER_ENCODING:
2950 result = http_req_set_TE(data, req, httpversion);
2951 break;
2952
2953#ifndef CURL_DISABLE_ALTSVC
2954 case H1_HD_ALT_USED:
2955 if(conn->bits.altused && conn->via_peer &&
2956 !Curl_checkheaders(data, STRCONST("Alt-Used")))
2957 result = curlx_dyn_addf(req, "Alt-Used: %s:%u\r\n",
2958 conn->via_peer->hostname, conn->via_peer->port);
2959 break;
2960#endif
2961
2962 case H1_HD_UPGRADE:
2963 if(!Curl_conn_is_ssl(data->conn, FIRSTSOCKET) && (httpversion < 20) &&
2964 (data->state.http_neg.wanted & CURL_HTTP_V2x) &&
2965 data->state.http_neg.h2_upgrade) {
2966 /* append HTTP2 upgrade magic stuff to the HTTP request if it is not done
2967 over SSL */
2968 result = Curl_http2_request_upgrade(req, data);
2969 }
2970#ifndef CURL_DISABLE_WEBSOCKETS
2971 if(!result && conn->scheme->protocol & (CURLPROTO_WS | CURLPROTO_WSS))
2972 result = Curl_ws_request(data, req);
2973#endif
2974 break;
2975
2976 case H1_HD_COOKIES:
2977 result = http_cookies(data, req);
2978 break;
2979
2980 case H1_HD_CONDITIONALS:
2981 result = Curl_add_timecondition(data, req);
2982 break;
2983
2984 case H1_HD_CUSTOM:
2985 result = Curl_add_custom_headers(data, FALSE, httpversion, req);
2986 break;
2987
2988 case H1_HD_CONTENT:
2989 result = http_add_content_hds(data, req, httpversion, httpreq);
2990 break;
2991
2992 case H1_HD_CONNECTION: {
2993 result = http_add_connection_hd(data, req);
2994 break;
2995 }
2996
2997 case H1_HD_LAST:
2998 result = curlx_dyn_addn(req, STRCONST("\r\n"));
2999 break;
3000 }
3001 return result;
3002}
3003
3004/*
3005 * Curl_http() gets called from the generic multi_do() function when an HTTP
3006 * request is to be performed. This creates and sends a properly constructed
3007 * HTTP request.
3008 */
3009CURLcode Curl_http(struct Curl_easy *data, bool *done)
3010{
3011 CURLcode result = CURLE_OK;
3012 Curl_HttpReq httpreq;
3013 const char *method;
3014 struct dynbuf req;
3015 unsigned char httpversion;
3016 size_t hd_id;
3017
3018 /* Always consider the DO phase done after this function call, even if there
3019 may be parts of the request that are not yet sent, since we can deal with
3020 the rest of the request in the PERFORM phase. */
3021 *done = TRUE;
3022 /* initialize a dynamic send-buffer */
3023 curlx_dyn_init(&req, DYN_HTTP_REQUEST);
3024 /* make sure the header buffer is reset - if there are leftovers from a
3025 previous transfer */
3026 curlx_dyn_reset(&data->state.headerb);
3027 data->state.maybe_folded = FALSE;
3028
3029 if(!data->conn->bits.reuse) {
3030 result = http_check_new_conn(data);
3031 if(result)
3032 goto out;
3033 }
3034
3035 /* Add collecting of headers written to client. For a new connection,
3036 * we might have done that already, but reuse
3037 * or multiplex needs it here as well. */
3038 result = Curl_headers_init(data);
3039 if(result)
3040 goto out;
3041
3042 data->state.http_hd_te = FALSE;
3043 data->state.http_hd_upgrade = FALSE;
3044 data->state.http_hd_h2_settings = FALSE;
3045
3046 /* what kind of request do we need to send? */
3047 Curl_http_method(data, &method, &httpreq);
3048
3049 /* select host to send */
3050 result = http_set_aptr_host(data);
3051 /* setup the authentication headers, how that method and host are known */
3052 if(!result)
3053 result = Curl_http_output_auth(data, data->conn, method, httpreq,
3054 data->state.up.path,
3055 data->state.up.query, FALSE);
3056 if(!result)
3057 result = http_useragent(data);
3058 /* Setup input reader, resume information and ranges */
3059 if(!result)
3060 result = set_reader(data, httpreq);
3061 if(!result)
3062 result = http_resume(data, httpreq);
3063 if(!result)
3064 result = http_range(data, httpreq);
3065 if(result)
3066 goto out;
3067
3068 httpversion = http_request_version(data);
3069 /* Add request line and all headers to `req` */
3070 for(hd_id = 0; hd_id <= H1_HD_LAST; ++hd_id) {
3071 result = http_add_hd(data, &req, (http_hd_t)hd_id,
3072 httpversion, method, httpreq);
3073 if(result)
3074 goto out;
3075 }
3076
3077 /* setup variables for the upcoming transfer and send */
3078 Curl_xfer_setup_sendrecv(data, FIRSTSOCKET, -1);
3079 result = Curl_req_send(data, &req, httpversion);
3080
3081 if((httpversion >= 20) && data->req.upload_chunky)
3082 /* upload_chunky was set above to set up the request in a chunky fashion,
3083 but is disabled here again to avoid that the chunked encoded version is
3084 actually used when sending the request body over h2 */
3085 data->req.upload_chunky = FALSE;
3086
3087out:
3088 if(result == CURLE_TOO_LARGE)
3089 failf(data, "HTTP request too large");
3090
3091 curlx_dyn_free(&req);
3092 return result;
3093}
3094
3095typedef enum {
3096 STATUS_UNKNOWN, /* not enough data to tell yet */
3097 STATUS_DONE, /* a status line was read */
3098 STATUS_BAD /* not a status line */
3099} statusline;
3100
3101/* Check a string for a prefix. Check no more than 'len' bytes */
3102static bool checkprefixmax(const char *prefix, const char *buffer, size_t len)
3103{
3104 size_t ch = CURLMIN(strlen(prefix), len);
3105 return curl_strnequal(prefix, buffer, ch);
3106}
3107
3108/*
3109 * checkhttpprefix()
3110 *
3111 * Returns TRUE if member of the list matches prefix of string
3112 */
3113static statusline checkhttpprefix(struct Curl_easy *data,
3114 const char *s, size_t len)
3115{
3116 struct curl_slist *head = data->set.http200aliases;
3117 statusline rc = STATUS_BAD;
3118 statusline onmatch = len >= 5 ? STATUS_DONE : STATUS_UNKNOWN;
3119
3120 while(head) {
3121 if(checkprefixmax(head->data, s, len)) {
3122 rc = onmatch;
3123 break;
3124 }
3125 head = head->next;
3126 }
3127
3128 if((rc != STATUS_DONE) && (checkprefixmax("HTTP/", s, len)))
3129 rc = onmatch;
3130
3131 return rc;
3132}
3133
3134#ifndef CURL_DISABLE_RTSP
3135static statusline checkrtspprefix(struct Curl_easy *data,
3136 const char *s, size_t len)
3137{
3138 statusline status = STATUS_BAD;
3139 statusline onmatch = len >= 5 ? STATUS_DONE : STATUS_UNKNOWN;
3140 (void)data;
3141 if(checkprefixmax("RTSP/", s, len))
3142 status = onmatch;
3143
3144 return status;
3145}
3146#endif /* CURL_DISABLE_RTSP */
3147
3148static statusline checkprotoprefix(struct Curl_easy *data,
3149 struct connectdata *conn,
3150 const char *s, size_t len)
3151{
3152#ifndef CURL_DISABLE_RTSP
3153 if(conn->scheme->protocol & CURLPROTO_RTSP)
3154 return checkrtspprefix(data, s, len);
3155#else
3156 (void)conn;
3157#endif /* CURL_DISABLE_RTSP */
3158
3159 return checkhttpprefix(data, s, len);
3160}
3161
3162/* HTTP header has field name `n` (a string constant) */
3163#define HD_IS(hd, hdlen, n) \
3164 (((hdlen) >= (sizeof(n) - 1)) && curl_strnequal(n, hd, sizeof(n) - 1))
3165
3166#define HD_VAL(hd, hdlen, n) \
3167 ((((hdlen) >= (sizeof(n) - 1)) && (hd) && \
3168 curl_strnequal(n, hd, sizeof(n) - 1)) ? ((hd) + (sizeof(n) - 1)) : NULL)
3169
3170/* HTTP header has field name `n` (a string constant) and contains `v`
3171 * (a string constant) in its value(s) */
3172#define HD_IS_AND_SAYS(hd, hdlen, n, v) \
3173 (HD_IS(hd, hdlen, n) && \
3174 ((hdlen) > ((sizeof(n) - 1) + (sizeof(v) - 1))) && \
3175 Curl_compareheader(hd, STRCONST(n), STRCONST(v)))
3176
3177/*
3178 * http_header_a() parses a single response header starting with A.
3179 */
3180static CURLcode http_header_a(struct Curl_easy *data,
3181 const char *hd, size_t hdlen)
3182{
3183#ifndef CURL_DISABLE_ALTSVC
3184 const char *v;
3185 struct connectdata *conn = data->conn;
3186 v = (data->asi &&
3187 (Curl_xfer_is_secure(data) ||
3188#ifdef DEBUGBUILD
3189 /* allow debug builds to circumvent the HTTPS restriction */
3190 getenv("CURL_ALTSVC_HTTP")
3191#else
3192 0
3193#endif
3194 )) ? HD_VAL(hd, hdlen, "Alt-Svc:") : NULL;
3195 if(v) {
3196 /* the ALPN of the current request */
3197 struct SingleRequest *k = &data->req;
3198 enum alpnid id = (k->httpversion == 30) ? ALPN_h3 :
3199 (k->httpversion == 20) ? ALPN_h2 : ALPN_h1;
3200 return Curl_altsvc_parse(data, data->asi, v, id, conn->origin->hostname,
3201 curlx_uitous((unsigned int)conn->origin->port));
3202 }
3203#else
3204 (void)data;
3205 (void)hd;
3206 (void)hdlen;
3207#endif
3208 return CURLE_OK;
3209}
3210
3211/*
3212 * http_header_c() parses a single response header starting with C.
3213 */
3214static CURLcode http_header_c(struct Curl_easy *data,
3215 const char *hd, size_t hdlen)
3216{
3217 struct connectdata *conn = data->conn;
3218 struct SingleRequest *k = &data->req;
3219 const char *v;
3220
3221 /* Check for Content-Length: header lines to get size. Browsers insist we
3222 should accept multiple Content-Length headers and that a comma separated
3223 list also is fine and then we should accept them all as long as they are
3224 the same value. Different values trigger error.
3225 */
3226 v = (!k->http_bodyless && !data->set.ignorecl) ?
3227 HD_VAL(hd, hdlen, "Content-Length:") : NULL;
3228 if(v) {
3229 do {
3230 curl_off_t contentlength;
3231 int offt = curlx_str_numblanks(&v, &contentlength);
3232
3233 if(offt == STRE_OVERFLOW) {
3234 /* out of range */
3235 if(data->set.max_filesize) {
3236 failf(data, "Maximum file size exceeded");
3237 return CURLE_FILESIZE_EXCEEDED;
3238 }
3239 streamclose(conn, "overflow content-length");
3240 infof(data, "Overflow Content-Length: value");
3241 return CURLE_OK;
3242 }
3243 else {
3244 if((offt == STRE_OK) &&
3245 ((k->size == -1) || /* not set to something before */
3246 (k->size == contentlength))) { /* or the same value */
3247
3248 k->size = contentlength;
3249 curlx_str_passblanks(&v);
3250
3251 /* on a comma, loop and get the next instead */
3252 if(!curlx_str_single(&v, ','))
3253 continue;
3254
3255 if(!curlx_str_newline(&v)) {
3256 k->maxdownload = k->size;
3257 return CURLE_OK;
3258 }
3259 }
3260 /* negative, different value or rubbish - bad HTTP */
3261 failf(data, "Invalid Content-Length: value");
3262 return CURLE_WEIRD_SERVER_REPLY;
3263 }
3264 } while(1);
3265 }
3266 v = (!k->http_bodyless && data->set.str[STRING_ENCODING]) ?
3267 HD_VAL(hd, hdlen, "Content-Encoding:") : NULL;
3268 if(v) {
3269 /*
3270 * Process Content-Encoding. Look for the values: identity, gzip, deflate,
3271 * compress, x-gzip and x-compress. x-gzip and x-compress are the same as
3272 * gzip and compress. (Sec 3.5 RFC 2616). zlib cannot handle compress.
3273 * Errors are handled further down when the response body is processed
3274 */
3275 return Curl_build_unencoding_stack(data, v, FALSE);
3276 }
3277 /* check for Content-Type: header lines to get the MIME-type */
3278 v = HD_VAL(hd, hdlen, "Content-Type:");
3279 if(v) {
3280 char *contenttype = Curl_copy_header_value(hd);
3281 if(!contenttype)
3282 return CURLE_OUT_OF_MEMORY;
3283 if(!*contenttype)
3284 /* ignore empty data */
3285 curlx_free(contenttype);
3286 else {
3287 curlx_free(data->info.contenttype);
3288 data->info.contenttype = contenttype;
3289 }
3290 return CURLE_OK;
3291 }
3292 if((k->httpversion < 20) &&
3293 HD_IS_AND_SAYS(hd, hdlen, "Connection:", "close")) {
3294 /*
3295 * [RFC 2616, section 8.1.2.1]
3296 * "Connection: close" is HTTP/1.1 language and means that
3297 * the connection will close when this request has been
3298 * served.
3299 */
3300 connclose(conn, "Connection: close used");
3301 return CURLE_OK;
3302 }
3303 if((k->httpversion == 10) &&
3304 HD_IS_AND_SAYS(hd, hdlen, "Connection:", "keep-alive")) {
3305 /*
3306 * An HTTP/1.0 reply with the 'Connection: keep-alive' line
3307 * tells us the connection will be kept alive for our
3308 * pleasure. Default action for 1.0 is to close.
3309 *
3310 * [RFC2068, section 19.7.1] */
3311 connkeep(conn, "Connection keep-alive");
3312 infof(data, "HTTP/1.0 connection set to keep alive");
3313 return CURLE_OK;
3314 }
3315 v = !k->http_bodyless ? HD_VAL(hd, hdlen, "Content-Range:") : NULL;
3316 if(v) {
3317 /* Content-Range: bytes [num]-
3318 Content-Range: bytes: [num]-
3319 Content-Range: [num]-
3320 Content-Range: [asterisk]/[total]
3321
3322 The second format was added since Sun's webserver
3323 JavaWebServer/1.1.1 obviously sends the header this way!
3324 The third added since some servers use that!
3325 The fourth means the requested range was unsatisfied.
3326 */
3327
3328 const char *ptr = v;
3329
3330 /* Move forward until first digit or asterisk */
3331 while(*ptr && !ISDIGIT(*ptr) && *ptr != '*')
3332 ptr++;
3333
3334 /* if it truly stopped on a digit */
3335 if(ISDIGIT(*ptr)) {
3336 if(!curlx_str_number(&ptr, &k->offset, CURL_OFF_T_MAX) &&
3337 (data->state.resume_from == k->offset))
3338 /* we asked for a resume and we got it */
3339 k->content_range = TRUE;
3340 }
3341 else if(k->httpcode < 300)
3342 data->state.resume_from = 0; /* get everything */
3343 }
3344 return CURLE_OK;
3345}
3346
3347/*
3348 * http_header_l() parses a single response header starting with L.
3349 */
3350static CURLcode http_header_l(struct Curl_easy *data,
3351 const char *hd, size_t hdlen)
3352{
3353 struct connectdata *conn = data->conn;
3354 struct SingleRequest *k = &data->req;
3355 const char *v = (!k->http_bodyless &&
3356 (data->set.timecondition || data->set.get_filetime)) ?
3357 HD_VAL(hd, hdlen, "Last-Modified:") : NULL;
3358 if(v) {
3359 if(Curl_getdate_capped(v, &k->timeofdoc))
3360 k->timeofdoc = 0;
3361 if(data->set.get_filetime)
3362 data->info.filetime = k->timeofdoc;
3363 return CURLE_OK;
3364 }
3365 if(HD_IS(hd, hdlen, "Location:")) {
3366 /* this is the URL that the server advises us to use instead */
3367 char *location = Curl_copy_header_value(hd);
3368 if(!location)
3369 return CURLE_OUT_OF_MEMORY;
3370 if(!*location ||
3371 (data->req.location && !strcmp(data->req.location, location))) {
3372 /* ignore empty header, or exact repeat of a previous one */
3373 curlx_free(location);
3374 return CURLE_OK;
3375 }
3376 else {
3377 /* has value and is not an exact repeat */
3378 if(data->req.location) {
3379 failf(data, "Multiple Location headers");
3380 curlx_free(location);
3381 return CURLE_WEIRD_SERVER_REPLY;
3382 }
3383 data->req.location = location;
3384
3385 if((k->httpcode >= 300 && k->httpcode < 400) &&
3386 data->set.http_follow_mode) {
3387 CURLcode result;
3388 DEBUGASSERT(!data->req.newurl);
3389 data->req.newurl = curlx_strdup(data->req.location); /* clone */
3390 if(!data->req.newurl)
3391 return CURLE_OUT_OF_MEMORY;
3392
3393 /* some cases of POST and PUT etc needs to rewind the data
3394 stream at this point */
3395 result = http_perhapsrewind(data, conn);
3396 if(result)
3397 return result;
3398
3399 /* mark the next request as a followed location: */
3400 data->state.this_is_a_follow = TRUE;
3401 }
3402 }
3403 }
3404 return CURLE_OK;
3405}
3406
3407/*
3408 * http_header_p() parses a single response header starting with P.
3409 */
3410static CURLcode http_header_p(struct Curl_easy *data,
3411 const char *hd, size_t hdlen)
3412{
3413 struct SingleRequest *k = &data->req;
3414
3415#ifndef CURL_DISABLE_PROXY
3416 const char *v = HD_VAL(hd, hdlen, "Proxy-Connection:");
3417 if(v) {
3418 struct connectdata *conn = data->conn;
3419 if((k->httpversion == 10) && conn->bits.httpproxy &&
3420 HD_IS_AND_SAYS(hd, hdlen, "Proxy-Connection:", "keep-alive")) {
3421 /*
3422 * When an HTTP/1.0 reply comes when using a proxy, the
3423 * 'Proxy-Connection: keep-alive' line tells us the
3424 * connection will be kept alive for our pleasure.
3425 * Default action for 1.0 is to close.
3426 */
3427 connkeep(conn, "Proxy-Connection keep-alive"); /* do not close */
3428 infof(data, "HTTP/1.0 proxy connection set to keep alive");
3429 }
3430 else if((k->httpversion == 11) && conn->bits.httpproxy &&
3431 HD_IS_AND_SAYS(hd, hdlen, "Proxy-Connection:", "close")) {
3432 /*
3433 * We get an HTTP/1.1 response from a proxy and it says it will
3434 * close down after this transfer.
3435 */
3436 connclose(conn, "Proxy-Connection: asked to close after done");
3437 infof(data, "HTTP/1.1 proxy connection set close");
3438 }
3439 return CURLE_OK;
3440 }
3441#endif
3442 if((407 == k->httpcode) && HD_IS(hd, hdlen, "Proxy-authenticate:")) {
3443 char *auth = Curl_copy_header_value(hd);
3444 CURLcode result = auth ? CURLE_OK : CURLE_OUT_OF_MEMORY;
3445 if(!result) {
3446 result = Curl_http_input_auth(data, TRUE, auth);
3447 curlx_free(auth);
3448 }
3449 return result;
3450 }
3451#ifdef USE_SPNEGO
3452 if(HD_IS(hd, hdlen, "Persistent-Auth:")) {
3453 struct connectdata *conn = data->conn;
3454 struct negotiatedata *negdata = Curl_auth_nego_get(conn, FALSE);
3455 struct auth *authp = &data->state.authhost;
3456 if(!negdata)
3457 return CURLE_OUT_OF_MEMORY;
3458 if(authp->picked == CURLAUTH_NEGOTIATE) {
3459 char *persistentauth = Curl_copy_header_value(hd);
3460 if(!persistentauth)
3461 return CURLE_OUT_OF_MEMORY;
3462 negdata->noauthpersist = !!checkprefix("false", persistentauth);
3463 negdata->havenoauthpersist = TRUE;
3464 infof(data, "Negotiate: noauthpersist -> %d, header part: %s",
3465 negdata->noauthpersist, persistentauth);
3466 curlx_free(persistentauth);
3467 }
3468 }
3469#endif
3470 return CURLE_OK;
3471}
3472
3473/*
3474 * http_header_r() parses a single response header starting with R.
3475 */
3476static CURLcode http_header_r(struct Curl_easy *data,
3477 const char *hd, size_t hdlen)
3478{
3479 const char *v = HD_VAL(hd, hdlen, "Retry-After:");
3480 if(v) {
3481 /* Retry-After = HTTP-date / delay-seconds */
3482 curl_off_t retry_after = 0; /* zero for unknown or "now" */
3483 time_t date = 0;
3484 curlx_str_passblanks(&v);
3485
3486 /* try it as a date first, because a date can otherwise start with and
3487 get treated as a number */
3488 if(!Curl_getdate_capped(v, &date)) {
3489 time_t current = time(NULL);
3490 if(date >= current)
3491 /* convert date to number of seconds into the future */
3492 retry_after = date - current;
3493 }
3494 else
3495 /* Try it as a decimal number, ignore errors */
3496 (void)curlx_str_number(&v, &retry_after, CURL_OFF_T_MAX);
3497 /* limit to 6 hours max. this is not documented so that it can be changed
3498 in the future if necessary. */
3499 if(retry_after > 21600)
3500 retry_after = 21600;
3501 data->info.retry_after = retry_after;
3502 }
3503 return CURLE_OK;
3504}
3505
3506/*
3507 * http_header_s() parses a single response header starting with S.
3508 */
3509static CURLcode http_header_s(struct Curl_easy *data,
3510 const char *hd, size_t hdlen)
3511{
3512#if !defined(CURL_DISABLE_COOKIES) || !defined(CURL_DISABLE_HSTS)
3513 struct connectdata *conn = data->conn;
3514 const char *v;
3515#else
3516 (void)data;
3517 (void)hd;
3518 (void)hdlen;
3519#endif
3520
3521#ifndef CURL_DISABLE_COOKIES
3522 v = (data->cookies && data->state.cookie_engine) ?
3523 HD_VAL(hd, hdlen, "Set-Cookie:") : NULL;
3524 if(v) {
3525 /* If there is a custom-set Host: name, use it here, or else use
3526 * real peer hostname. */
3527 const char *host = data->req.cookiehost ?
3528 data->req.cookiehost : conn->origin->hostname;
3529 const bool secure_context = Curl_secure_context(conn, host);
3530 CURLcode result;
3531 Curl_share_lock(data, CURL_LOCK_DATA_COOKIE, CURL_LOCK_ACCESS_SINGLE);
3532 result = Curl_cookie_add(data, data->cookies, TRUE, FALSE, v, host,
3533 data->state.up.path, secure_context);
3534 Curl_share_unlock(data, CURL_LOCK_DATA_COOKIE);
3535 return result;
3536 }
3537#endif
3538#ifndef CURL_DISABLE_HSTS
3539 /* If enabled, the header is incoming and this is over HTTPS */
3540 v = (data->hsts &&
3541 (Curl_xfer_is_secure(data) ||
3542#ifdef DEBUGBUILD
3543 /* allow debug builds to circumvent the HTTPS restriction */
3544 getenv("CURL_HSTS_HTTP")
3545#else
3546 0
3547#endif
3548 )
3549 ) ? HD_VAL(hd, hdlen, "Strict-Transport-Security:") : NULL;
3550 if(v) {
3551 CURLcode result =
3552 Curl_hsts_parse(data->hsts, conn->origin->hostname, v);
3553 if(result) {
3554 if(result == CURLE_OUT_OF_MEMORY)
3555 return result;
3556 infof(data, "Illegal STS header skipped");
3557 }
3558#ifdef DEBUGBUILD
3559 else
3560 infof(data, "Parsed STS header fine (%zu entries)",
3561 Curl_llist_count(&data->hsts->list));
3562#endif
3563 }
3564#endif
3565
3566 return CURLE_OK;
3567}
3568
3569/*
3570 * http_header_t() parses a single response header starting with T.
3571 */
3572static CURLcode http_header_t(struct Curl_easy *data,
3573 const char *hd, size_t hdlen)
3574{
3575 struct connectdata *conn = data->conn;
3576 struct SingleRequest *k = &data->req;
3577
3578 /* RFC 9112, ch. 6.1
3579 * "Transfer-Encoding MAY be sent in a response to a HEAD request or
3580 * in a 304 (Not Modified) response (Section 15.4.5 of [HTTP]) to a
3581 * GET request, neither of which includes a message body, to indicate
3582 * that the origin server would have applied a transfer coding to the
3583 * message body if the request had been an unconditional GET."
3584 *
3585 * Read: in these cases the 'Transfer-Encoding' does not apply
3586 * to any data following the response headers. Do not add any decoders.
3587 */
3588 const char *v = (!k->http_bodyless &&
3589 (data->state.httpreq != HTTPREQ_HEAD) &&
3590 (k->httpcode != 304)) ?
3591 HD_VAL(hd, hdlen, "Transfer-Encoding:") : NULL;
3592 if(v) {
3593 /* One or more encodings. We check for chunked and/or a compression
3594 algorithm. */
3595 CURLcode result = Curl_build_unencoding_stack(data, v, TRUE);
3596 if(result)
3597 return result;
3598 if(!k->chunk && data->set.http_transfer_encoding) {
3599 /* if this is not chunked, only close can signal the end of this
3600 * transfer as Content-Length is said not to be trusted for
3601 * transfer-encoding! */
3602 connclose(conn, "HTTP/1.1 transfer-encoding without chunks");
3603 k->ignore_cl = TRUE;
3604 }
3605 return CURLE_OK;
3606 }
3607 v = HD_VAL(hd, hdlen, "Trailer:");
3608 if(v) {
3609 data->req.resp_trailer = TRUE;
3610 return CURLE_OK;
3611 }
3612 return CURLE_OK;
3613}
3614
3615/*
3616 * http_header_w() parses a single response header starting with W.
3617 */
3618static CURLcode http_header_w(struct Curl_easy *data,
3619 const char *hd, size_t hdlen)
3620{
3621 struct SingleRequest *k = &data->req;
3622 CURLcode result = CURLE_OK;
3623
3624 if((401 == k->httpcode) && HD_IS(hd, hdlen, "WWW-Authenticate:")) {
3625 char *auth = Curl_copy_header_value(hd);
3626 if(!auth)
3627 result = CURLE_OUT_OF_MEMORY;
3628 else {
3629 result = Curl_http_input_auth(data, FALSE, auth);
3630 curlx_free(auth);
3631 }
3632 }
3633 return result;
3634}
3635
3636/*
3637 * http_header() parses a single response header.
3638 */
3639static CURLcode http_header(struct Curl_easy *data,
3640 const char *hd, size_t hdlen)
3641{
3642 CURLcode result = CURLE_OK;
3643
3644 switch(hd[0]) {
3645 case 'a':
3646 case 'A':
3647 result = http_header_a(data, hd, hdlen);
3648 break;
3649 case 'c':
3650 case 'C':
3651 result = http_header_c(data, hd, hdlen);
3652 break;
3653 case 'l':
3654 case 'L':
3655 result = http_header_l(data, hd, hdlen);
3656 break;
3657 case 'p':
3658 case 'P':
3659 result = http_header_p(data, hd, hdlen);
3660 break;
3661 case 'r':
3662 case 'R':
3663 result = http_header_r(data, hd, hdlen);
3664 break;
3665 case 's':
3666 case 'S':
3667 result = http_header_s(data, hd, hdlen);
3668 break;
3669 case 't':
3670 case 'T':
3671 result = http_header_t(data, hd, hdlen);
3672 break;
3673 case 'w':
3674 case 'W':
3675 result = http_header_w(data, hd, hdlen);
3676 break;
3677 }
3678
3679 if(!result) {
3680 struct connectdata *conn = data->conn;
3681 if(conn->scheme->protocol & CURLPROTO_RTSP)
3682 result = Curl_rtsp_parseheader(data, hd);
3683 }
3684 return result;
3685}
3686
3687/*
3688 * Called after the first HTTP response line (the status line) has been
3689 * received and parsed.
3690 */
3691static CURLcode http_statusline(struct Curl_easy *data,
3692 struct connectdata *conn)
3693{
3694 struct SingleRequest *k = &data->req;
3695
3696 switch(k->httpversion) {
3697 case 10:
3698 case 11:
3699#ifdef USE_HTTP2
3700 case 20:
3701#endif
3702#ifdef USE_HTTP3
3703 case 30:
3704#endif
3705 /* no major version switch mid-connection */
3706 if(k->httpversion_sent &&
3707 (k->httpversion / 10 != k->httpversion_sent / 10)) {
3708 failf(data, "Version mismatch (from HTTP/%d to HTTP/%d)",
3709 k->httpversion_sent / 10, k->httpversion / 10);
3710 return CURLE_WEIRD_SERVER_REPLY;
3711 }
3712 break;
3713 default:
3714 failf(data, "Unsupported HTTP version (%d.%d) in response",
3715 k->httpversion / 10, k->httpversion % 10);
3716 return CURLE_UNSUPPORTED_PROTOCOL;
3717 }
3718
3719 data->info.httpcode = k->httpcode;
3720 data->info.httpversion = k->httpversion;
3721 conn->httpversion_seen = k->httpversion;
3722
3723 if(!data->state.http_neg.rcvd_min ||
3724 data->state.http_neg.rcvd_min > k->httpversion)
3725 /* store the lowest server version we encounter */
3726 data->state.http_neg.rcvd_min = k->httpversion;
3727
3728 /*
3729 * This code executes as part of processing the header. As a
3730 * result, it is not totally clear how to interpret the
3731 * response code yet as that depends on what other headers may
3732 * be present. 401 and 407 may be errors, but may be OK
3733 * depending on how authentication is working. Other codes
3734 * are definitely errors, so give up here.
3735 */
3736 if(data->state.resume_from && data->state.httpreq == HTTPREQ_GET &&
3737 k->httpcode == 416) {
3738 /* "Requested Range Not Satisfiable", proceed and pretend this is no
3739 error */
3740 k->ignorebody = TRUE; /* Avoid appending error msg to good data. */
3741 }
3742
3743 if(k->httpversion == 10) {
3744 /* Default action for HTTP/1.0 must be to close, unless
3745 we get one of those fancy headers that tell us the
3746 server keeps it open for us! */
3747 infof(data, "HTTP 1.0, assume close after body");
3748 connclose(conn, "HTTP/1.0 close after body");
3749 }
3750
3751 k->http_bodyless = k->httpcode >= 100 && k->httpcode < 200;
3752 switch(k->httpcode) {
3753 case 304:
3754 /* (quote from RFC2616, section 10.3.5): The 304 response
3755 * MUST NOT contain a message-body, and thus is always
3756 * terminated by the first empty line after the header
3757 * fields. */
3758 if(data->set.timecondition)
3759 data->info.timecond = TRUE;
3760 FALLTHROUGH();
3761 case 204:
3762 /* (quote from RFC2616, section 10.2.5): The server has
3763 * fulfilled the request but does not need to return an
3764 * entity-body ... The 204 response MUST NOT include a
3765 * message-body, and thus is always terminated by the first
3766 * empty line after the header fields. */
3767 k->size = 0;
3768 k->maxdownload = 0;
3769 k->http_bodyless = TRUE;
3770 break;
3771 default:
3772 break;
3773 }
3774 return CURLE_OK;
3775}
3776
3777/* Content-Length must be ignored if any Transfer-Encoding is present in the
3778 response. Refer to RFC 7230 section 3.3.3 and RFC2616 section 4.4. This is
3779 figured out here after all headers have been received but before the final
3780 call to the user's header callback, so that a valid content length can be
3781 retrieved by the user in the final call. */
3782static CURLcode http_size(struct Curl_easy *data)
3783{
3784 struct SingleRequest *k = &data->req;
3785 if(data->req.ignore_cl || k->chunk) {
3786 k->size = k->maxdownload = -1;
3787 }
3788 else if(k->size != -1) {
3789 if(data->set.max_filesize &&
3790 !k->ignorebody &&
3791 (k->size > data->set.max_filesize)) {
3792 failf(data, "Maximum file size exceeded");
3793 return CURLE_FILESIZE_EXCEEDED;
3794 }
3795 if(k->ignorebody)
3796 infof(data, "setting size while ignoring");
3797 Curl_pgrsSetDownloadSize(data, k->size);
3798 k->maxdownload = k->size;
3799 }
3800 return CURLE_OK;
3801}
3802
3803static CURLcode verify_header(struct Curl_easy *data,
3804 const char *hd, size_t hdlen)
3805{
3806 struct SingleRequest *k = &data->req;
3807 const char *ptr = memchr(hd, 0x00, hdlen);
3808 if(ptr) {
3809 /* this is bad, bail out */
3810 failf(data, "Nul byte in header");
3811 return CURLE_WEIRD_SERVER_REPLY;
3812 }
3813 if(k->headerline < 2)
3814 /* the first "header" is the status-line and it has no colon */
3815 return CURLE_OK;
3816 if(((hd[0] == ' ') || (hd[0] == '\t')) && k->headerline > 2)
3817 /* line folding, cannot happen on line 2 */
3818 ;
3819 else {
3820 ptr = memchr(hd, ':', hdlen);
3821 if(!ptr) {
3822 /* this is bad, bail out */
3823 failf(data, "Header without colon");
3824 return CURLE_WEIRD_SERVER_REPLY;
3825 }
3826 }
3827 return CURLE_OK;
3828}
3829
3830CURLcode Curl_bump_headersize(struct Curl_easy *data,
3831 size_t delta,
3832 bool connect_only)
3833{
3834 size_t bad = 0;
3835 unsigned int max = MAX_HTTP_RESP_HEADER_SIZE;
3836 if(delta < MAX_HTTP_RESP_HEADER_SIZE) {
3837 data->info.header_size += (unsigned int)delta;
3838 data->req.allheadercount += (unsigned int)delta;
3839 if(!connect_only)
3840 data->req.headerbytecount += (unsigned int)delta;
3841 if(data->req.allheadercount > max)
3842 bad = data->req.allheadercount;
3843 else if(data->info.header_size > (max * 20)) {
3844 bad = data->info.header_size;
3845 max *= 20;
3846 }
3847 }
3848 else
3849 bad = data->req.allheadercount + delta;
3850 if(bad) {
3851 failf(data, "Too large response headers: %zu > %u", bad, max);
3852 return CURLE_RECV_ERROR;
3853 }
3854 return CURLE_OK;
3855}
3856
3857/*
3858 * Handle a 101 Switching Protocols response. Performs the actual protocol
3859 * upgrade to HTTP/2 or WebSocket based on what was requested.
3860 */
3861static CURLcode http_on_101_upgrade(struct Curl_easy *data,
3862 const char *buf, size_t blen,
3863 size_t *pconsumed,
3864 bool *conn_changed)
3865{
3866 struct connectdata *conn = data->conn;
3867 struct SingleRequest *k = &data->req;
3868
3869#if !defined(USE_NGHTTP2) && defined(CURL_DISABLE_WEBSOCKETS)
3870 (void)buf;
3871 (void)blen;
3872 (void)pconsumed;
3873#else
3874 CURLcode result;
3875 int upgr101_requested = k->upgr101;
3876#endif
3877
3878 if(k->httpversion_sent != 11) {
3879 /* invalid for other HTTP versions */
3880 failf(data, "server sent 101 response while not talking HTTP/1.1");
3881 return CURLE_WEIRD_SERVER_REPLY;
3882 }
3883
3884 /* Whatever the success, upgrade was selected. */
3885 k->upgr101 = UPGR101_RECEIVED;
3886 conn->bits.upgrade_in_progress = FALSE;
3887 *conn_changed = TRUE;
3888
3889 /* To be fully compliant, we would check the "Upgrade:" response header to
3890 * mention the protocol we requested. */
3891#ifdef USE_NGHTTP2
3892 if(upgr101_requested == UPGR101_H2) {
3893 /* Switch to HTTP/2, where we will get more responses. blen bytes in buf
3894 * are already h2 protocol bytes */
3895 infof(data, "Received 101, Switching to HTTP/2");
3896 result = Curl_http2_upgrade(data, conn, FIRSTSOCKET, buf, blen);
3897 if(!result)
3898 *pconsumed += blen;
3899 return result;
3900 }
3901#endif
3902#ifndef CURL_DISABLE_WEBSOCKETS
3903 if(upgr101_requested == UPGR101_WS) {
3904 /* Switch to WebSocket, where we now stream ws frames. blen bytes in buf
3905 * are already ws protocol bytes */
3906 infof(data, "Received 101, Switching to WebSocket");
3907 result = Curl_ws_accept(data, buf, blen);
3908 if(!result)
3909 *pconsumed += blen; /* ws accept handled the data */
3910 return result;
3911 }
3912#endif
3913 /* We silently accept this as the final response. What are we switching to
3914 * if we did not ask for an Upgrade? Maybe the application provided an
3915 * `Upgrade: xxx` header? */
3916 k->header = FALSE;
3917 return CURLE_OK;
3918}
3919
3920/*
3921 * Handle 1xx intermediate HTTP responses. Sets up state for more
3922 * headers and processes 100-continue and 101 upgrade responses.
3923 */
3924static CURLcode http_on_1xx_response(struct Curl_easy *data,
3925 const char *buf, size_t blen,
3926 size_t *pconsumed,
3927 bool *conn_changed)
3928{
3929 struct SingleRequest *k = &data->req;
3930
3931 /* "A user agent MAY ignore unexpected 1xx status responses."
3932 * By default, we expect to get more responses after this one. */
3933 k->header = TRUE;
3934 k->headerline = 0; /* restart the header line counter */
3935
3936 switch(k->httpcode) {
3937 case 100:
3938 /* We have made an HTTP PUT or POST and this is 1.1-lingo that tells us
3939 * that the server is OK with this and ready to receive the data. */
3940 http_exp100_got100(data);
3941 break;
3942 case 101:
3943 return http_on_101_upgrade(data, buf, blen, pconsumed, conn_changed);
3944 default:
3945 /* The server may send us other 1xx responses, like informative 103. This
3946 * has no influence on request processing and we expect to receive a
3947 * final response eventually. */
3948 break;
3949 }
3950 return CURLE_OK;
3951}
3952
3953#if defined(USE_NTLM) || defined(USE_SPNEGO)
3954/*
3955 * Check if NTLM or SPNEGO authentication negotiation failed due to
3956 * connection closure (typically on HTTP/1.0 servers).
3957 */
3958static void http_check_auth_closure(struct Curl_easy *data,
3959 struct connectdata *conn)
3960{
3961 /* At this point we have some idea about the fate of the connection. If we
3962 are closing the connection it may result auth failure. */
3963#ifdef USE_NTLM
3964 if(conn->bits.close &&
3965 (((data->req.httpcode == 401) &&
3966 (conn->http_ntlm_state == NTLMSTATE_TYPE2)) ||
3967 ((data->req.httpcode == 407) &&
3968 (conn->proxy_ntlm_state == NTLMSTATE_TYPE2)))) {
3969 infof(data, "Connection closure while negotiating auth (HTTP 1.0?)");
3970 data->state.authproblem = TRUE;
3971 }
3972#endif
3973#ifdef USE_SPNEGO
3974 if(conn->bits.close &&
3975 (((data->req.httpcode == 401) &&
3976 (conn->http_negotiate_state == GSS_AUTHRECV)) ||
3977 ((data->req.httpcode == 407) &&
3978 (conn->proxy_negotiate_state == GSS_AUTHRECV)))) {
3979 infof(data, "Connection closure while negotiating auth (HTTP 1.0?)");
3980 data->state.authproblem = TRUE;
3981 }
3982 if((conn->http_negotiate_state == GSS_AUTHDONE) &&
3983 (data->req.httpcode != 401)) {
3984 conn->http_negotiate_state = GSS_AUTHSUCC;
3985 }
3986 if((conn->proxy_negotiate_state == GSS_AUTHDONE) &&
3987 (data->req.httpcode != 407)) {
3988 conn->proxy_negotiate_state = GSS_AUTHSUCC;
3989 }
3990#endif
3991}
3992#else
3993#define http_check_auth_closure(x, y) /* empty */
3994#endif
3995
3996/*
3997 * Handle an error response (>= 300) received while still sending the
3998 * request body. Deals with 417 Expectation Failed retries, keep-sending
3999 * on error, and aborting the send.
4000 */
4001static CURLcode http_handle_send_error(struct Curl_easy *data)
4002{
4003 struct connectdata *conn = data->conn;
4004 struct SingleRequest *k = &data->req;
4005 CURLcode result = CURLE_OK;
4006
4007 if(!data->req.authneg && !conn->bits.close &&
4008 !Curl_creader_will_rewind(data)) {
4009 /*
4010 * General treatment of errors when about to send data.
4011 * Including: "417 Expectation Failed", while waiting for
4012 * 100-continue.
4013 *
4014 * The check for close above is done because if something
4015 * else has already deemed the connection to get closed then
4016 * something else should have considered the big picture and
4017 * we avoid this check.
4018 */
4019
4020 switch(data->state.httpreq) {
4021 case HTTPREQ_PUT:
4022 case HTTPREQ_POST:
4023 case HTTPREQ_POST_FORM:
4024 case HTTPREQ_POST_MIME:
4025 /* We got an error response. If this happened before the
4026 * whole request body has been sent we stop sending and
4027 * mark the connection for closure after we have read the
4028 * entire response. */
4029 if(!Curl_req_done_sending(data)) {
4030 if((k->httpcode == 417) && http_exp100_is_selected(data)) {
4031 /* 417 Expectation Failed - try again without the
4032 Expect header */
4033 if(!k->writebytecount && http_exp100_is_waiting(data)) {
4034 infof(data, "Got HTTP failure 417 while waiting for a 100");
4035 }
4036 else {
4037 infof(data, "Got HTTP failure 417 while sending data");
4038 streamclose(conn, "Stop sending data before everything sent");
4039 result = http_perhapsrewind(data, conn);
4040 if(result)
4041 return result;
4042 }
4043 data->state.disableexpect = TRUE;
4044 Curl_req_abort_sending(data);
4045 DEBUGASSERT(!data->req.newurl);
4046 data->req.newurl = Curl_bufref_dup(&data->state.url);
4047 if(!data->req.newurl)
4048 return CURLE_OUT_OF_MEMORY;
4049 }
4050 else if(data->set.http_keep_sending_on_error) {
4051 infof(data, "HTTP error before end of send, keep sending");
4052 http_exp100_send_anyway(data);
4053 }
4054 else {
4055 infof(data, "HTTP error before end of send, stop sending");
4056 streamclose(conn, "Stop sending data before everything sent");
4057 result = Curl_req_abort_sending(data);
4058 if(result)
4059 return result;
4060 }
4061 }
4062 break;
4063
4064 default: /* default label present to avoid compiler warnings */
4065 break;
4066 }
4067 }
4068
4069 if(Curl_creader_will_rewind(data) && !Curl_req_done_sending(data)) {
4070 /* We rewind before next send, continue sending now */
4071 infof(data, "Keep sending data to get tossed away");
4072 CURL_REQ_SET_SEND(data);
4073 }
4074 return result;
4075}
4076
4077static CURLcode http_on_response(struct Curl_easy *data,
4078 const char *last_hd, size_t last_hd_len,
4079 const char *buf, size_t blen,
4080 size_t *pconsumed)
4081{
4082 struct connectdata *conn = data->conn;
4083 CURLcode result = CURLE_OK;
4084 struct SingleRequest *k = &data->req;
4085 bool conn_changed = FALSE;
4086
4087 (void)buf; /* not used without HTTP2 enabled */
4088 *pconsumed = 0;
4089
4090 if(k->upgr101 == UPGR101_RECEIVED) {
4091 /* supposedly upgraded to http2 now */
4092 if(data->req.httpversion != 20)
4093 infof(data, "Lying server, not serving HTTP/2");
4094 }
4095
4096 if(k->httpcode < 200 && last_hd) {
4097 /* Intermediate responses might trigger processing of more responses,
4098 * write the last header to the client before proceeding. */
4099 result = http_write_header(data, last_hd, last_hd_len);
4100 last_hd = NULL; /* handled it */
4101 if(result)
4102 goto out;
4103 }
4104
4105 if(k->httpcode < 100) {
4106 failf(data, "Unsupported response code in HTTP response");
4107 result = CURLE_UNSUPPORTED_PROTOCOL;
4108 goto out;
4109 }
4110 else if(k->httpcode < 200) {
4111 result = http_on_1xx_response(data, buf, blen, pconsumed, &conn_changed);
4112 goto out;
4113 }
4114
4115 /* k->httpcode >= 200, final response */
4116 k->header = FALSE;
4117 if(conn->bits.upgrade_in_progress) {
4118 /* Asked for protocol upgrade, but it was not selected */
4119 conn->bits.upgrade_in_progress = FALSE;
4120 conn_changed = TRUE;
4121 }
4122
4123 if((k->size == -1) && !k->chunk && !conn->bits.close &&
4124 (k->httpversion == 11) &&
4125 !(conn->scheme->protocol & CURLPROTO_RTSP) &&
4126 data->state.httpreq != HTTPREQ_HEAD) {
4127 /* On HTTP 1.1, when connection is not to get closed, but no
4128 Content-Length nor Transfer-Encoding chunked have been received,
4129 according to RFC2616 section 4.4 point 5, we assume that the server
4130 will close the connection to signal the end of the document. */
4131 infof(data, "no chunk, no close, no size. Assume close to signal end");
4132 streamclose(conn, "HTTP: No end-of-message indicator");
4133 }
4134
4135 http_check_auth_closure(data, conn);
4136
4137#ifndef CURL_DISABLE_WEBSOCKETS
4138 /* All >=200 HTTP status codes are errors when wanting ws */
4139 if(data->req.upgr101 == UPGR101_WS) {
4140 failf(data, "Refused WebSocket upgrade: %d", k->httpcode);
4141 result = CURLE_HTTP_RETURNED_ERROR;
4142 goto out;
4143 }
4144#endif
4145
4146 /* Check if this response means the transfer errored. */
4147 if(http_should_fail(data, data->req.httpcode)) {
4148 failf(data, "The requested URL returned error: %d",
4149 k->httpcode);
4150 result = CURLE_HTTP_RETURNED_ERROR;
4151 goto out;
4152 }
4153
4154 /* Curl_http_auth_act() checks what authentication methods that are
4155 * available and decides which one (if any) to use. It will set 'newurl' if
4156 * an auth method was picked. */
4157 result = Curl_http_auth_act(data);
4158 if(result)
4159 goto out;
4160
4161 if(k->httpcode >= 300) {
4162 result = http_handle_send_error(data);
4163 if(result)
4164 goto out;
4165 }
4166
4167 /* If we requested a "no body", this is a good time to get
4168 * out and return home.
4169 */
4170 if(data->req.no_body)
4171 k->download_done = TRUE;
4172
4173 /* If max download size is *zero* (nothing) we already have nothing and can
4174 safely return ok now! For HTTP/2, we would like to call
4175 http2_handle_stream_close to properly close a stream. In order to do
4176 this, we keep reading until we close the stream. */
4177 if((k->maxdownload == 0) && (k->httpversion_sent < 20))
4178 k->download_done = TRUE;
4179
4180 /* final response without error, prepare to receive the body */
4181 result = http_firstwrite(data);
4182
4183 if(!result)
4184 /* This is the last response that we get for the current request. Check on
4185 * the body size and determine if the response is complete. */
4186 result = http_size(data);
4187
4188out:
4189 if(last_hd)
4190 /* if not written yet, write it now */
4191 result = Curl_1st_fatal(result,
4192 http_write_header(data, last_hd, last_hd_len));
4193 if(conn_changed)
4194 /* poke the multi handle to allow pending pipewait to retry */
4195 Curl_multi_connchanged(data->multi);
4196 return result;
4197}
4198
4199static CURLcode http_rw_hd(struct Curl_easy *data,
4200 const char *hd, size_t hdlen,
4201 const char *buf_remain, size_t blen,
4202 size_t *pconsumed)
4203{
4204 CURLcode result = CURLE_OK;
4205 struct SingleRequest *k = &data->req;
4206 int writetype;
4207 DEBUGASSERT(!hd[hdlen]); /* null-terminated */
4208
4209 *pconsumed = 0;
4210 if((0x0a == *hd) || (0x0d == *hd)) {
4211 /* Empty header line means end of headers! */
4212 struct dynbuf last_header;
4213 size_t consumed;
4214
4215 curlx_dyn_init(&last_header, hdlen + 1);
4216 result = curlx_dyn_addn(&last_header, hd, hdlen);
4217 if(result)
4218 return result;
4219
4220 /* analyze the response to find out what to do. */
4221 /* Caveat: we clear anything in the header brigade, because a
4222 * response might switch HTTP version which may call use recursively.
4223 * Not nice, but that is currently the way of things. */
4224 curlx_dyn_reset(&data->state.headerb);
4225 result = http_on_response(data, curlx_dyn_ptr(&last_header),
4226 curlx_dyn_len(&last_header),
4227 buf_remain, blen, &consumed);
4228 *pconsumed += consumed;
4229 curlx_dyn_free(&last_header);
4230 return result;
4231 }
4232
4233 /*
4234 * Checks for special headers coming up.
4235 */
4236
4237 writetype = CLIENTWRITE_HEADER;
4238 if(!k->headerline++) {
4239 /* This is the first header, it MUST be the error code line
4240 or else we consider this to be the body right away! */
4241 bool fine_statusline = FALSE;
4242
4243 k->httpversion = 0; /* Do not know yet */
4244 if(data->conn->scheme->protocol & PROTO_FAMILY_HTTP) {
4245 /*
4246 * https://datatracker.ietf.org/doc/html/rfc7230#section-3.1.2
4247 *
4248 * The response code is always a three-digit number in HTTP as the spec
4249 * says. We allow any three-digit number here, but we cannot make
4250 * guarantees on future behaviors since it is not within the protocol.
4251 */
4252 const char *p = hd;
4253
4254 curlx_str_passblanks(&p);
4255 if(!strncmp(p, "HTTP/", 5)) {
4256 p += 5;
4257 switch(*p) {
4258 case '1':
4259 p++;
4260 if((p[0] == '.') && (p[1] == '0' || p[1] == '1')) {
4261 if(ISBLANK(p[2])) {
4262 k->httpversion = (unsigned char)(10 + (p[1] - '0'));
4263 p += 3;
4264 if(ISDIGIT(p[0]) && ISDIGIT(p[1]) && ISDIGIT(p[2])) {
4265 k->httpcode = ((p[0] - '0') * 100) + ((p[1] - '0') * 10) +
4266 (p[2] - '0');
4267 /* RFC 9112 requires a single space following the status code,
4268 but the browsers do not so let's not insist */
4269 fine_statusline = TRUE;
4270 }
4271 }
4272 }
4273 if(!fine_statusline) {
4274 failf(data, "Unsupported HTTP/1 subversion in response");
4275 return CURLE_UNSUPPORTED_PROTOCOL;
4276 }
4277 break;
4278 case '2':
4279 case '3':
4280 if(!ISBLANK(p[1]))
4281 break;
4282 k->httpversion = (unsigned char)((*p - '0') * 10);
4283 p += 2;
4284 if(ISDIGIT(p[0]) && ISDIGIT(p[1]) && ISDIGIT(p[2])) {
4285 k->httpcode = ((p[0] - '0') * 100) + ((p[1] - '0') * 10) +
4286 (p[2] - '0');
4287 p += 3;
4288 if(!ISBLANK(*p))
4289 break;
4290 fine_statusline = TRUE;
4291 }
4292 break;
4293 default: /* unsupported */
4294 failf(data, "Unsupported HTTP version in response");
4295 return CURLE_UNSUPPORTED_PROTOCOL;
4296 }
4297 }
4298
4299 if(!fine_statusline) {
4300 /* If user has set option HTTP200ALIASES,
4301 compare header line against list of aliases
4302 */
4303 statusline check = checkhttpprefix(data, hd, hdlen);
4304 if(check == STATUS_DONE) {
4305 fine_statusline = TRUE;
4306 k->httpcode = 200;
4307 k->httpversion = 10;
4308 }
4309 }
4310 }
4311 else if(data->conn->scheme->protocol & CURLPROTO_RTSP) {
4312 const char *p = hd;
4313 struct Curl_str ver;
4314 curl_off_t status;
4315 /* we set the max string a little excessive to forgive some leading
4316 spaces */
4317 if(!curlx_str_until(&p, &ver, 32, ' ') &&
4318 !curlx_str_single(&p, ' ') &&
4319 !curlx_str_number(&p, &status, 999)) {
4320 curlx_str_trimblanks(&ver);
4321 if(curlx_str_cmp(&ver, "RTSP/1.0")) {
4322 k->httpcode = (int)status;
4323 fine_statusline = TRUE;
4324 k->httpversion = 11; /* RTSP acts like HTTP 1.1 */
4325 }
4326 }
4327 if(!fine_statusline)
4328 return CURLE_WEIRD_SERVER_REPLY;
4329 }
4330
4331 if(fine_statusline) {
4332 result = http_statusline(data, data->conn);
4333 if(result)
4334 return result;
4335 writetype |= CLIENTWRITE_STATUS;
4336 }
4337 else {
4338 k->header = FALSE; /* this is not a header line */
4339 return CURLE_WEIRD_SERVER_REPLY;
4340 }
4341 }
4342
4343 result = verify_header(data, hd, hdlen);
4344 if(result)
4345 return result;
4346
4347 result = http_header(data, hd, hdlen);
4348 if(result)
4349 return result;
4350
4351 /*
4352 * Taken in one (more) header. Write it to the client.
4353 */
4354 Curl_debug(data, CURLINFO_HEADER_IN, hd, hdlen);
4355
4356 if(k->httpcode / 100 == 1)
4357 writetype |= CLIENTWRITE_1XX;
4358 result = Curl_client_write(data, writetype, hd, hdlen);
4359 if(result)
4360 return result;
4361
4362 result = Curl_bump_headersize(data, hdlen, FALSE);
4363 if(result)
4364 return result;
4365
4366 return CURLE_OK;
4367}
4368
4369/* remove trailing CRLF then all trailing whitespace */
4370void Curl_http_to_fold(struct dynbuf *bf)
4371{
4372 size_t len = curlx_dyn_len(bf);
4373 const char *hd = curlx_dyn_ptr(bf);
4374 if(len && (hd[len - 1] == '\n'))
4375 len--;
4376 if(len && (hd[len - 1] == '\r'))
4377 len--;
4378 while(len && ISBLANK(hd[len - 1])) /* strip off trailing whitespace */
4379 len--;
4380 curlx_dyn_setlen(bf, len);
4381}
4382
4383static void unfold_header(struct Curl_easy *data)
4384{
4385 Curl_http_to_fold(&data->state.headerb);
4386 data->state.leading_unfold = TRUE;
4387}
4388
4389/*
4390 * Read any HTTP header lines from the server and pass them to the client app.
4391 */
4392static CURLcode http_parse_headers(struct Curl_easy *data,
4393 const char *buf, size_t blen,
4394 size_t *pconsumed)
4395{
4396 struct connectdata *conn = data->conn;
4397 CURLcode result = CURLE_OK;
4398 struct SingleRequest *k = &data->req;
4399 const char *end_ptr;
4400 bool leftover_body = FALSE;
4401
4402 /* we have bytes for the next header, make sure it is not a folded header
4403 before passing it on */
4404 if(data->state.maybe_folded && blen) {
4405 if(ISBLANK(buf[0])) {
4406 /* folded, remove the trailing newlines and append the next header */
4407 unfold_header(data);
4408 }
4409 else {
4410 /* the header data we hold is a complete header, pass it on */
4411 size_t ignore_this;
4412 result = http_rw_hd(data, curlx_dyn_ptr(&data->state.headerb),
4413 curlx_dyn_len(&data->state.headerb),
4414 NULL, 0, &ignore_this);
4415 curlx_dyn_reset(&data->state.headerb);
4416 if(result)
4417 return result;
4418 }
4419 data->state.maybe_folded = FALSE;
4420 }
4421
4422 /* header line within buffer loop */
4423 *pconsumed = 0;
4424 while(blen && k->header) {
4425 size_t consumed;
4426 size_t hlen;
4427 const char *hd;
4428 size_t unfold_len = 0;
4429
4430 if(data->state.leading_unfold) {
4431 /* immediately after an unfold, keep only a single whitespace */
4432 while(blen && ISBLANK(buf[0])) {
4433 buf++;
4434 blen--;
4435 unfold_len++;
4436 }
4437 if(blen) {
4438 /* insert a single space */
4439 result = curlx_dyn_addn(&data->state.headerb, " ", 1);
4440 if(result)
4441 return result;
4442 data->state.leading_unfold = FALSE; /* done now */
4443 }
4444 }
4445
4446 end_ptr = memchr(buf, '\n', blen);
4447 if(!end_ptr) {
4448 /* Not a complete header line within buffer, append the data to
4449 the end of the headerbuff. */
4450 result = curlx_dyn_addn(&data->state.headerb, buf, blen);
4451 if(result)
4452 return result;
4453 *pconsumed += blen + unfold_len;
4454
4455 if(!k->headerline) {
4456 /* check if this looks like a protocol header */
4457 statusline st =
4458 checkprotoprefix(data, conn,
4459 curlx_dyn_ptr(&data->state.headerb),
4460 curlx_dyn_len(&data->state.headerb));
4461
4462 if(st == STATUS_BAD) {
4463 /* this is not the beginning of a protocol first header line.
4464 * Cannot be 0.9 if version was detected or connection was reused. */
4465 k->header = FALSE;
4466 streamclose(conn, "bad HTTP: No end-of-message indicator");
4467 if((k->httpversion >= 10) || conn->bits.reuse) {
4468 failf(data, "Invalid status line");
4469 return CURLE_WEIRD_SERVER_REPLY;
4470 }
4471 if(!data->state.http_neg.accept_09) {
4472 failf(data, "Received HTTP/0.9 when not allowed");
4473 return CURLE_UNSUPPORTED_PROTOCOL;
4474 }
4475 leftover_body = TRUE;
4476 goto out;
4477 }
4478 }
4479 goto out; /* read more and try again */
4480 }
4481
4482 /* the size of the remaining header line */
4483 consumed = (end_ptr - buf) + 1;
4484
4485 result = curlx_dyn_addn(&data->state.headerb, buf, consumed);
4486 if(result)
4487 return result;
4488 blen -= consumed;
4489 buf += consumed;
4490 *pconsumed += consumed + unfold_len;
4491
4492 /****
4493 * We now have a FULL header line in 'headerb'.
4494 *****/
4495
4496 hlen = curlx_dyn_len(&data->state.headerb);
4497 hd = curlx_dyn_ptr(&data->state.headerb);
4498
4499 if(!k->headerline) {
4500 /* the first read "header", the status line */
4501 statusline st = checkprotoprefix(data, conn, hd, hlen);
4502 if(st == STATUS_BAD) {
4503 streamclose(conn, "bad HTTP: No end-of-message indicator");
4504 /* this is not the beginning of a protocol first header line.
4505 * Cannot be 0.9 if version was detected or connection was reused. */
4506 if((k->httpversion >= 10) || conn->bits.reuse) {
4507 failf(data, "Invalid status line");
4508 return CURLE_WEIRD_SERVER_REPLY;
4509 }
4510 if(!data->state.http_neg.accept_09) {
4511 failf(data, "Received HTTP/0.9 when not allowed");
4512 return CURLE_UNSUPPORTED_PROTOCOL;
4513 }
4514 k->header = FALSE;
4515 leftover_body = TRUE;
4516 goto out;
4517 }
4518 }
4519 else {
4520 if(hlen && !ISNEWLINE(hd[0])) {
4521 /* this is NOT the header separator */
4522
4523 /* if we have bytes for the next header, check for folding */
4524 if(blen && ISBLANK(buf[0])) {
4525 /* remove the trailing CRLF and append the next header */
4526 unfold_header(data);
4527 continue;
4528 }
4529 else if(!blen) {
4530 /* this might be a folded header so deal with it in next invoke */
4531 data->state.maybe_folded = TRUE;
4532 break;
4533 }
4534 }
4535 }
4536
4537 result = http_rw_hd(data, hd, hlen, buf, blen, &consumed);
4538 /* We are done with this line. We reset because response
4539 * processing might switch to HTTP/2 and that might call us
4540 * directly again. */
4541 curlx_dyn_reset(&data->state.headerb);
4542 if(consumed) {
4543 blen -= consumed;
4544 buf += consumed;
4545 *pconsumed += consumed;
4546 }
4547 if(result)
4548 return result;
4549 }
4550
4551 /* We might have reached the end of the header part here, but
4552 there might be a non-header part left in the end of the read
4553 buffer. */
4554out:
4555 if(!k->header && !leftover_body) {
4556 curlx_dyn_free(&data->state.headerb);
4557 }
4558 return CURLE_OK;
4559}
4560
4561CURLcode Curl_http_write_resp_hd(struct Curl_easy *data,
4562 const char *hd, size_t hdlen,
4563 bool is_eos)
4564{
4565 CURLcode result;
4566 size_t consumed;
4567 char tmp = 0;
4568 DEBUGASSERT(!hd[hdlen]); /* null-terminated */
4569
4570 result = http_rw_hd(data, hd, hdlen, &tmp, 0, &consumed);
4571 if(!result && is_eos) {
4572 result = Curl_client_write(data, (CLIENTWRITE_BODY | CLIENTWRITE_EOS),
4573 &tmp, 0);
4574 }
4575 return result;
4576}
4577
4578/*
4579 * HTTP protocol `write_resp` implementation. Parse headers
4580 * when not done yet and otherwise return without consuming data.
4581 */
4582CURLcode Curl_http_write_resp_hds(struct Curl_easy *data,
4583 const char *buf, size_t blen,
4584 size_t *pconsumed)
4585{
4586 if(!data->req.header) {
4587 *pconsumed = 0;
4588 return CURLE_OK;
4589 }
4590 else {
4591 CURLcode result;
4592
4593 result = http_parse_headers(data, buf, blen, pconsumed);
4594 if(!result && !data->req.header) {
4595 if(!data->req.no_body && curlx_dyn_len(&data->state.headerb)) {
4596 /* leftover from parsing something that turned out not
4597 * to be a header, only happens if we allow for
4598 * HTTP/0.9 like responses */
4599 result = Curl_client_write(data, CLIENTWRITE_BODY,
4600 curlx_dyn_ptr(&data->state.headerb),
4601 curlx_dyn_len(&data->state.headerb));
4602 }
4603 curlx_dyn_free(&data->state.headerb);
4604 }
4605 return result;
4606 }
4607}
4608
4609CURLcode Curl_http_write_resp(struct Curl_easy *data,
4610 const char *buf, size_t blen,
4611 bool is_eos)
4612{
4613 CURLcode result;
4614 size_t consumed;
4615 int flags;
4616
4617 result = Curl_http_write_resp_hds(data, buf, blen, &consumed);
4618 if(result || data->req.done)
4619 goto out;
4620
4621 DEBUGASSERT(consumed <= blen);
4622 blen -= consumed;
4623 buf += consumed;
4624 /* either all was consumed in header parsing, or we have data left
4625 * and are done with headers, e.g. it is BODY data */
4626 DEBUGASSERT(!blen || !data->req.header);
4627 if(!data->req.header && (blen || is_eos)) {
4628 /* BODY data after header been parsed, write and consume */
4629 flags = CLIENTWRITE_BODY;
4630 if(is_eos)
4631 flags |= CLIENTWRITE_EOS;
4632 result = Curl_client_write(data, flags, buf, blen);
4633 }
4634out:
4635 return result;
4636}
4637
4638/* Decode HTTP status code string. */
4639CURLcode Curl_http_decode_status(int *pstatus, const char *s, size_t len)
4640{
4641 CURLcode result = CURLE_BAD_FUNCTION_ARGUMENT;
4642 int status = 0;
4643 int i;
4644
4645 if(len != 3)
4646 goto out;
4647
4648 for(i = 0; i < 3; ++i) {
4649 char c = s[i];
4650
4651 if(c < '0' || c > '9')
4652 goto out;
4653
4654 status *= 10;
4655 status += c - '0';
4656 }
4657 result = CURLE_OK;
4658out:
4659 *pstatus = result ? -1 : status;
4660 return result;
4661}
4662
4663CURLcode Curl_http_req_make(struct httpreq **preq,
4664 const char *method, size_t m_len,
4665 const char *scheme, size_t s_len,
4666 const char *authority, size_t a_len,
4667 const char *path, size_t p_len)
4668{
4669 struct httpreq *req;
4670 CURLcode result = CURLE_OUT_OF_MEMORY;
4671
4672 DEBUGASSERT(method && m_len);
4673
4674 req = curlx_calloc(1, sizeof(*req) + m_len);
4675 if(!req)
4676 goto out;
4677#if defined(__GNUC__) && __GNUC__ >= 13
4678#pragma GCC diagnostic push
4679/* error: 'memcpy' offset [137, 142] from the object at 'req' is out of
4680 the bounds of referenced subobject 'method' with type 'char[1]' at
4681 offset 136 */
4682#pragma GCC diagnostic ignored "-Warray-bounds"
4683#endif
4684 memcpy(req->method, method, m_len);
4685#if defined(__GNUC__) && __GNUC__ >= 13
4686#pragma GCC diagnostic pop
4687#endif
4688 if(scheme) {
4689 req->scheme = curlx_memdup0(scheme, s_len);
4690 if(!req->scheme)
4691 goto out;
4692 }
4693 if(authority) {
4694 req->authority = curlx_memdup0(authority, a_len);
4695 if(!req->authority)
4696 goto out;
4697 }
4698 if(path) {
4699 req->path = curlx_memdup0(path, p_len);
4700 if(!req->path)
4701 goto out;
4702 }
4703 Curl_dynhds_init(&req->headers, 0, DYN_HTTP_REQUEST);
4704 Curl_dynhds_init(&req->trailers, 0, DYN_HTTP_REQUEST);
4705 result = CURLE_OK;
4706
4707out:
4708 if(result && req)
4709 Curl_http_req_free(req);
4710 *preq = result ? NULL : req;
4711 return result;
4712}
4713
4714static CURLcode req_assign_url_authority(struct httpreq *req, CURLU *url)
4715{
4716 char *host, *port;
4717 struct dynbuf buf;
4718 CURLUcode uc;
4719 CURLcode result = CURLE_URL_MALFORMAT;
4720
4721 host = port = NULL;
4722 curlx_dyn_init(&buf, DYN_HTTP_REQUEST);
4723
4724 uc = curl_url_get(url, CURLUPART_HOST, &host, 0);
4725 if(uc && uc != CURLUE_NO_HOST)
4726 goto out;
4727 if(!host) {
4728 req->authority = NULL;
4729 result = CURLE_OK;
4730 goto out;
4731 }
4732
4733 uc = curl_url_get(url, CURLUPART_PORT, &port, CURLU_NO_DEFAULT_PORT);
4734 if(uc && uc != CURLUE_NO_PORT)
4735 goto out;
4736
4737 result = curlx_dyn_add(&buf, host);
4738 if(result)
4739 goto out;
4740 if(port) {
4741 result = curlx_dyn_addf(&buf, ":%s", port);
4742 if(result)
4743 goto out;
4744 }
4745 req->authority = curlx_dyn_ptr(&buf);
4746out:
4747 curlx_free(host);
4748 curlx_free(port);
4749 if(result)
4750 curlx_dyn_free(&buf);
4751 return result;
4752}
4753
4754static CURLcode req_assign_url_path(struct httpreq *req, CURLU *url)
4755{
4756 char *path, *query;
4757 struct dynbuf buf;
4758 CURLUcode uc;
4759 CURLcode result = CURLE_URL_MALFORMAT;
4760
4761 path = query = NULL;
4762 curlx_dyn_init(&buf, DYN_HTTP_REQUEST);
4763
4764 uc = curl_url_get(url, CURLUPART_PATH, &path, 0);
4765 if(uc)
4766 goto out;
4767 uc = curl_url_get(url, CURLUPART_QUERY, &query, 0);
4768 if(uc && uc != CURLUE_NO_QUERY)
4769 goto out;
4770
4771 if(!query) {
4772 req->path = path;
4773 path = NULL;
4774 }
4775 else {
4776 result = curlx_dyn_add(&buf, path);
4777 if(!result)
4778 result = curlx_dyn_addf(&buf, "?%s", query);
4779 if(result)
4780 goto out;
4781 req->path = curlx_dyn_ptr(&buf);
4782 }
4783 result = CURLE_OK;
4784
4785out:
4786 curlx_free(path);
4787 curlx_free(query);
4788 if(result)
4789 curlx_dyn_free(&buf);
4790 return result;
4791}
4792
4793CURLcode Curl_http_req_make2(struct httpreq **preq,
4794 const char *method, size_t m_len,
4795 CURLU *url, const char *scheme_default)
4796{
4797 struct httpreq *req;
4798 CURLcode result = CURLE_OUT_OF_MEMORY;
4799 CURLUcode uc;
4800
4801 DEBUGASSERT(method && m_len);
4802
4803 req = curlx_calloc(1, sizeof(*req) + m_len);
4804 if(!req)
4805 goto out;
4806 memcpy(req->method, method, m_len);
4807
4808 uc = curl_url_get(url, CURLUPART_SCHEME, &req->scheme, 0);
4809 if(uc && uc != CURLUE_NO_SCHEME)
4810 goto out;
4811 if(!req->scheme && scheme_default) {
4812 req->scheme = curlx_strdup(scheme_default);
4813 if(!req->scheme)
4814 goto out;
4815 }
4816
4817 result = req_assign_url_authority(req, url);
4818 if(result)
4819 goto out;
4820 result = req_assign_url_path(req, url);
4821 if(result)
4822 goto out;
4823
4824 Curl_dynhds_init(&req->headers, 0, DYN_HTTP_REQUEST);
4825 Curl_dynhds_init(&req->trailers, 0, DYN_HTTP_REQUEST);
4826 result = CURLE_OK;
4827
4828out:
4829 if(result && req)
4830 Curl_http_req_free(req);
4831 *preq = result ? NULL : req;
4832 return result;
4833}
4834
4835void Curl_http_req_free(struct httpreq *req)
4836{
4837 if(req) {
4838 curlx_free(req->scheme);
4839 curlx_free(req->authority);
4840 curlx_free(req->path);
4841 Curl_dynhds_free(&req->headers);
4842 Curl_dynhds_free(&req->trailers);
4843 curlx_free(req);
4844 }
4845}
4846
4847struct name_const {
4848 const char *name;
4849 size_t namelen;
4850};
4851
4852/* keep them sorted by length! */
4853static const struct name_const H2_NON_FIELD[] = {
4854 { STRCONST("Host") },
4855 { STRCONST("Upgrade") },
4856 { STRCONST("Connection") },
4857 { STRCONST("Keep-Alive") },
4858 { STRCONST("Proxy-Connection") },
4859 { STRCONST("Transfer-Encoding") },
4860};
4861
4862static bool h2_permissible_field(struct dynhds_entry *e)
4863{
4864 size_t i;
4865 for(i = 0; i < CURL_ARRAYSIZE(H2_NON_FIELD); ++i) {
4866 if(e->namelen < H2_NON_FIELD[i].namelen)
4867 return TRUE;
4868 if(e->namelen == H2_NON_FIELD[i].namelen &&
4869 curl_strequal(H2_NON_FIELD[i].name, e->name))
4870 return FALSE;
4871 }
4872 return TRUE;
4873}
4874
4875static bool http_TE_has_token(const char *fvalue, const char *token)
4876{
4877 while(*fvalue) {
4878 struct Curl_str name;
4879
4880 /* skip to first token */
4881 while(ISBLANK(*fvalue) || *fvalue == ',')
4882 fvalue++;
4883 if(curlx_str_cspn(&fvalue, &name, " \t\r;,"))
4884 return FALSE;
4885 if(curlx_str_casecompare(&name, token))
4886 return TRUE;
4887
4888 /* skip any remainder after token, e.g. parameters with quoted strings */
4889 while(*fvalue && *fvalue != ',') {
4890 if(*fvalue == '"') {
4891 struct Curl_str qw;
4892 /* if we do not cleanly find a quoted word here, the header value
4893 * does not follow HTTP syntax and we reject */
4894 if(curlx_str_quotedword(&fvalue, &qw, CURL_MAX_HTTP_HEADER))
4895 return FALSE;
4896 }
4897 else
4898 fvalue++;
4899 }
4900 }
4901 return FALSE;
4902}
4903
4904CURLcode Curl_http_req_to_h2(struct dynhds *h2_headers,
4905 struct httpreq *req, struct Curl_easy *data)
4906{
4907 const char *scheme = NULL, *authority = NULL;
4908 struct dynhds_entry *e;
4909 size_t i;
4910 CURLcode result;
4911
4912 DEBUGASSERT(req);
4913 DEBUGASSERT(h2_headers);
4914
4915 if(req->scheme) {
4916 scheme = req->scheme;
4917 }
4918 else if(strcmp("CONNECT", req->method)) {
4919 scheme = Curl_checkheaders(data, STRCONST(HTTP_PSEUDO_SCHEME));
4920 if(scheme) {
4921 scheme += sizeof(HTTP_PSEUDO_SCHEME);
4922 curlx_str_passblanks(&scheme);
4923 infof(data, "set pseudo header %s to %s", HTTP_PSEUDO_SCHEME, scheme);
4924 }
4925 else {
4926 scheme = Curl_xfer_is_secure(data) ? "https" : "http";
4927 }
4928 }
4929
4930 if(req->authority) {
4931 authority = req->authority;
4932 }
4933 else {
4934 e = Curl_dynhds_get(&req->headers, STRCONST("Host"));
4935 if(e)
4936 authority = e->value;
4937 }
4938
4939 Curl_dynhds_reset(h2_headers);
4940 Curl_dynhds_set_opts(h2_headers, DYNHDS_OPT_LOWERCASE);
4941 result = Curl_dynhds_add(h2_headers, STRCONST(HTTP_PSEUDO_METHOD),
4942 req->method, strlen(req->method));
4943 if(!result && scheme) {
4944 result = Curl_dynhds_add(h2_headers, STRCONST(HTTP_PSEUDO_SCHEME),
4945 scheme, strlen(scheme));
4946 }
4947 if(!result && authority) {
4948 result = Curl_dynhds_add(h2_headers, STRCONST(HTTP_PSEUDO_AUTHORITY),
4949 authority, strlen(authority));
4950 }
4951 if(!result && req->path) {
4952 result = Curl_dynhds_add(h2_headers, STRCONST(HTTP_PSEUDO_PATH),
4953 req->path, strlen(req->path));
4954 }
4955 for(i = 0; !result && i < Curl_dynhds_count(&req->headers); ++i) {
4956 e = Curl_dynhds_getn(&req->headers, i);
4957 /* "TE" is special in that it is only permissible when it
4958 * has only value "trailers". RFC 9113 ch. 8.2.2 */
4959 if(e->namelen == 2 && curl_strequal("TE", e->name)) {
4960 if(http_TE_has_token(e->value, "trailers"))
4961 result = Curl_dynhds_add(h2_headers, e->name, e->namelen,
4962 "trailers", sizeof("trailers") - 1);
4963 }
4964 else if(h2_permissible_field(e)) {
4965 result = Curl_dynhds_add(h2_headers, e->name, e->namelen,
4966 e->value, e->valuelen);
4967 }
4968 }
4969
4970 return result;
4971}
4972
4973CURLcode Curl_http_resp_make(struct http_resp **presp,
4974 int status,
4975 const char *description)
4976{
4977 struct http_resp *resp;
4978 CURLcode result = CURLE_OUT_OF_MEMORY;
4979
4980 resp = curlx_calloc(1, sizeof(*resp));
4981 if(!resp)
4982 goto out;
4983
4984 resp->status = status;
4985 if(description) {
4986 resp->description = curlx_strdup(description);
4987 if(!resp->description)
4988 goto out;
4989 }
4990 Curl_dynhds_init(&resp->headers, 0, DYN_HTTP_REQUEST);
4991 Curl_dynhds_init(&resp->trailers, 0, DYN_HTTP_REQUEST);
4992 result = CURLE_OK;
4993
4994out:
4995 if(result && resp)
4996 Curl_http_resp_free(resp);
4997 *presp = result ? NULL : resp;
4998 return result;
4999}
5000
5001void Curl_http_resp_free(struct http_resp *resp)
5002{
5003 if(resp) {
5004 curlx_free(resp->description);
5005 Curl_dynhds_free(&resp->headers);
5006 Curl_dynhds_free(&resp->trailers);
5007 if(resp->prev)
5008 Curl_http_resp_free(resp->prev);
5009 curlx_free(resp);
5010 }
5011}
5012
5013/*
5014 * HTTP handler interface.
5015 */
5016const struct Curl_protocol Curl_protocol_http = {
5017 Curl_http_setup_conn, /* setup_connection */
5018 Curl_http, /* do_it */
5019 Curl_http_done, /* done */
5020 ZERO_NULL, /* do_more */
5021 ZERO_NULL, /* connect_it */
5022 ZERO_NULL, /* connecting */
5023 ZERO_NULL, /* doing */
5024 ZERO_NULL, /* proto_pollset */
5025 Curl_http_doing_pollset, /* doing_pollset */
5026 ZERO_NULL, /* domore_pollset */
5027 Curl_http_perform_pollset, /* perform_pollset */
5028 ZERO_NULL, /* disconnect */
5029 Curl_http_write_resp, /* write_resp */
5030 Curl_http_write_resp_hd, /* write_resp_hd */
5031 ZERO_NULL, /* connection_is_dead */
5032 ZERO_NULL, /* attach connection */
5033 Curl_http_follow, /* follow */
5034};
5035
5036#endif /* CURL_DISABLE_HTTP */